000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 837.032226] protocol 0800 is buggy, dev ip6tnl0 [ 837.051540] protocol 0800 is buggy, dev ip6tnl0 00:13:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf49", 0x11) 00:13:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) [ 837.075569] protocol 0800 is buggy, dev ip6tnl0 [ 837.087716] protocol 0800 is buggy, dev ip6tnl0 [ 837.118693] protocol 0800 is buggy, dev ip6tnl0 00:13:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500), 0x0) [ 837.141419] protocol 0800 is buggy, dev ip6tnl0 00:13:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf4982fcbc0f94245e435951337d38f3b6", 0x20) [ 837.187479] protocol 0800 is buggy, dev ip6tnl0 [ 837.199186] protocol 0800 is buggy, dev ip6tnl0 [ 837.211924] protocol 0800 is buggy, dev ip6tnl0 [ 837.222858] protocol 0800 is buggy, dev ip6tnl0 00:13:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500), 0x0) 00:13:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf49", 0x11) 00:13:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:13:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:13:57 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf4982fcbc0f94245e435951337d38f3b6", 0x20) 00:13:57 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000500), 0x0) 00:13:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf49", 0x11) 00:13:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:13:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500), 0x0) 00:13:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf4982fcbc0f94245e435951337d38f3b6", 0x20) 00:13:57 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf49", 0x11) 00:13:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:13:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000500), 0x0) 00:13:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:13:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf4982fcbc0f94245e435951337d38f3b6", 0x20) 00:13:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf49", 0x11) 00:13:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:13:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:13:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000040)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0}) 00:13:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500), 0x0) 00:13:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf49", 0x11) 00:13:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:13:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000040)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0}) 00:13:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500), 0x0) 00:13:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:13:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500), 0x0) 00:13:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:13:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:13:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500), 0x0) 00:13:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500), 0x0) 00:13:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000040)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0}) 00:13:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:13:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf", 0x10) 00:13:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500), 0x0) 00:13:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) clock_settime(0x0, &(0x7f0000000080)) 00:13:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:13:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:13:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) clock_settime(0x0, &(0x7f0000000080)) 00:13:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e4", 0x9) 00:13:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf", 0x10) 00:13:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:13:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) clock_settime(0x0, &(0x7f0000000080)) 00:13:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc", 0x1) 00:13:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:13:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:13:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf", 0x10) 00:13:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500), 0x0) 00:13:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf4982fcbc0f94245e", 0x18) 00:13:59 executing program 3: clock_gettime(0x0, &(0x7f0000000040)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0}) 00:13:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:13:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:13:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:13:59 executing program 3: clock_gettime(0x0, &(0x7f0000000040)) clock_settime(0x0, &(0x7f0000000080)) 00:13:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500), 0x0) 00:13:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf4982fcbc0f94245e", 0x18) 00:13:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:13:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:13:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:13:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf4982fcbc0f94245e", 0x18) 00:13:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x0, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:13:59 executing program 3: clock_gettime(0x0, &(0x7f0000000040)) clock_settime(0x0, &(0x7f0000000080)) 00:13:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500), 0x0) 00:13:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:13:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:13:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf4982fcbc0f94245e43595133", 0x1c) 00:13:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:13:59 executing program 3: clock_gettime(0x0, &(0x7f0000000040)) clock_settime(0x0, &(0x7f0000000080)) 00:13:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:13:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf4982fcbc0f94245e43595133", 0x1c) 00:14:00 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000000000)=0x8dc, 0x578) sendto$inet6(r1, &(0x7f0000000040), 0x10, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 00:14:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:14:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1000000000000030, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000028a, 0x0) 00:14:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf4982fcbc0f94245e43595133", 0x1c) 00:14:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1000000000000030, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000028a, 0x0) 00:14:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf4982fcbc0f94245e435951337d38", 0x1e) 00:14:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000140)) getpid() r2 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r3, r2, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r4, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000300)=r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000380)={r1}) 00:14:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1000000000000030, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000028a, 0x0) 00:14:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf4982fcbc0f94245e435951337d38", 0x1e) 00:14:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r4, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:14:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf4982fcbc0f94245e435951337d38", 0x1e) 00:14:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1000000000000030, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000028a, 0x0) 00:14:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1000000000000030, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000028a, 0x300000000000000) 00:14:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf4982fcbc0f94245e435951337d38f3", 0x1f) 00:14:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, 0xffffffffffffffff, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:14:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf4982fcbc0f94245e435951337d38f3", 0x1f) 00:14:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1000000000000030, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000028a, 0x300000000000000) 00:14:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00'}, 0x8) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:14:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500)="bc691a27d478ccd3e400bc81107950cf4982fcbc0f94245e435951337d38f3", 0x1f) 00:14:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1000000000000030, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000028a, 0x300000000000000) 00:14:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:14:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{}, {}, 0x0, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) 00:14:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1000000000000030, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000028a, 0x300000000000000) 00:14:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:14:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1000000000000030, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000028a, 0x300000000000000) 00:14:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) [ 842.037418] net_ratelimit: 3058 callbacks suppressed [ 842.039551] protocol 0800 is buggy, dev ip6tnl0 [ 842.042680] protocol 0800 is buggy, dev ip6tnl0 [ 842.074197] protocol 0800 is buggy, dev ip6tnl0 [ 842.091035] protocol 0800 is buggy, dev ip6tnl0 [ 842.118440] protocol 0800 is buggy, dev ip6tnl0 [ 842.139006] protocol 0800 is buggy, dev ip6tnl0 [ 842.164721] protocol 0800 is buggy, dev ip6tnl0 [ 842.171917] protocol 0800 is buggy, dev ip6tnl0 [ 842.196126] protocol 0800 is buggy, dev ip6tnl0 00:14:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) [ 842.223082] protocol 0800 is buggy, dev ip6tnl0 00:14:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:14:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:14:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r2}) 00:14:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000380)={r2}) 00:14:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000380)={r2}) 00:14:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r3 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r4, r3, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r6) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000380)={r2}) 00:14:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r2 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r3, r2, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r4, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)) 00:14:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x0, 0x29, &(0x7f0000000000), &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r2 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r3, r2, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r4, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)) 00:14:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x7, 0x29, &(0x7f0000000000)="b90703e69ebf08", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xb, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r2 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r3, r2, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r4, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)) 00:14:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xd, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e1008", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000fa00000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000200)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x5b, 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x9, 0x1ff, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x40, 0x0, 0x984, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000027c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x5b5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x3f}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) getpid() r2 = perf_event_open(&(0x7f0000002740)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r3, r2, 0x0, 0x14f, &(0x7f0000000600)='}\x00', 0x0}, 0x8) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r4, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)) 00:14:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41}, 0x28) 00:14:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41}, 0x28) 00:14:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41}, 0x28) 00:14:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41}, 0x28) 00:14:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x0, 0x29, &(0x7f0000000000), &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x7, 0x29, &(0x7f0000000000)="b90703e69ebf08", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xb, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:07 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xd, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e1008", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:07 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41}, 0x28) 00:14:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:09 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x0, 0x29, &(0x7f0000000000), &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:09 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x7, 0x29, &(0x7f0000000000)="b90703e69ebf08", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xb, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xd, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e1008", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:14:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41}, 0x28) 00:14:11 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) [ 851.357055] net_ratelimit: 1711 callbacks suppressed [ 851.357064] protocol 0800 is buggy, dev ip6tnl0 00:14:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41}, 0x28) [ 851.697920] protocol 0800 is buggy, dev ip6tnl0 00:14:11 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41}, 0x28) [ 852.043887] protocol 0800 is buggy, dev ip6tnl0 00:14:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:12 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00'}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:12 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:13 executing program 2: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00'}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r1, &(0x7f0000000980), 0xffffff4d) close(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:13 executing program 2: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00'}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r1, &(0x7f0000000980), 0xffffff4d) close(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:13 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:13 executing program 2: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00'}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r1, &(0x7f0000000980), 0xffffff4d) close(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) 00:14:14 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) 00:14:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:14 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="63707526350a0a0a0000010000039cd30e35cca01d3d0b0a1c60666f8dcc6d5c76fd2e9e09626b31deea1b0d3b8184872d58b62cc5b4223726b5797482fb1d83e6f82e2d6d0af3b128e9604401695c8d6c866c68a8fc80de2c4b74f41ac55d593b0906be2aaa26bd16785186f3d61afdd00427799b7ce4b70845ed9780731957b75bf0253e4d4df598be5e3d7121a60f70013200bbbe9d7235af657010520b26afa8247f3756ed4c4a34cf9040d5540acac2865fc1ce8ded62538de97482f4317a7772e66f88e5e3e7476378c091498dfde4bb73bf0a004b9ee55ba00a0f04a6b07345298ad052c3c12c62201c2349527a36fe4a7edad75fbe1fe586b178000000000000000093ab05") r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) 00:14:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) 00:14:14 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) 00:14:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:14 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) 00:14:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) 00:14:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:15 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") socket$kcm(0xa, 0x2, 0x11) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) 00:14:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:15 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") socket$kcm(0xa, 0x2, 0x11) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) 00:14:15 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") socket$kcm(0xa, 0x2, 0x11) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) 00:14:15 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:16 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x2, 0x11) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) 00:14:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:16 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x2, 0x11) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) 00:14:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:17 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x2, 0x11) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) 00:14:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:17 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x2, 0x11) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x9, 0x80000, 0x380000, &(0x7f00000003c0)) 00:14:17 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x2, 0x11) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x9, 0x80000, 0x380000, &(0x7f00000003c0)) 00:14:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:18 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="63707526350a0a0a0000010000039cd30e35cca01d3d0b0a1c60666f8dcc6d5c76fd2e9e09626b31deea1b0d3b8184872d58b62cc5b4223726b5797482fb1d83e6f82e2d6d0af3b128e9604401695c8d6c866c68a8fc80de2c4b74f41ac55d593b0906be2aaa26bd16785186f3d61afdd00427799b7ce4b70845ed9780731957b75bf0253e4d4df598be5e3d7121a60f70013200bbbe9d7235af657010520b26afa8247f3756ed4c4a34cf9040d5540acac2865fc1ce8ded62538de97482f4317a7772e66f88e5e3e7476378c091498dfde4bb73bf0a004b9ee55ba00a0f04a6b07345298ad052c3c12c62201c2349527a36fe4a7edad75fbe1fe586b178000000000000000093ab05") r1 = socket$kcm(0xa, 0x2, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x9, 0x80000, 0x380000, &(0x7f00000003c0)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'veth1\x00', 0xd020}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)={r3}) 00:14:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:18 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="63707526350a0a0a0000010000039cd30e35cca01d3d0b0a1c60666f8dcc6d5c76fd2e9e09626b31deea1b0d3b8184872d58b62cc5b4223726b5797482fb1d83e6f82e2d6d0af3b128e9604401695c8d6c866c68a8fc80de2c4b74f41ac55d593b0906be2aaa26bd16785186f3d61afdd00427799b7ce4b70845ed9780731957b75bf0253e4d4df598be5e3d7121a60f70013200bbbe9d7235af657010520b26afa8247f3756ed4c4a34cf9040d5540acac2865fc1ce8ded62538de97482f4317a7772e66f88e5e3e7476378c091498dfde4bb73bf0a004b9ee55ba00a0f04a6b07345298ad052c3c12c62201c2349527a36fe4a7edad75fbe1fe586b178000000000000000093ab05") r1 = socket$kcm(0xa, 0x2, 0x11) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x9, 0x80000, 0x380000, &(0x7f00000003c0)) 00:14:18 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="63707526350a0a0a0000010000039cd30e35cca01d3d0b0a1c60666f8dcc6d5c76fd2e9e09626b31deea1b0d3b8184872d58b62cc5b4223726b5797482fb1d83e6f82e2d6d0af3b128e9604401695c8d6c866c68a8fc80de2c4b74f41ac55d593b0906be2aaa26bd16785186f3d61afdd00427799b7ce4b70845ed9780731957b75bf0253e4d4df598be5e3d7121a60f70013200bbbe9d7235af657010520b26afa8247f3756ed4c4a34cf9040d5540acac2865fc1ce8ded62538de97482f4317a7772e66f88e5e3e7476378c091498dfde4bb73bf0a004b9ee55ba00a0f04a6b07345298ad052c3c12c62201c2349527a36fe4a7edad75fbe1fe586b178000000000000000093ab05") r1 = socket$kcm(0xa, 0x2, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x9, 0x80000, 0x380000, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'veth1\x00', 0xd020}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)={r3}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000100)=r4) 00:14:18 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x2, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x9, 0x80000, 0x380000, &(0x7f00000003c0)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'veth1\x00', 0xd020}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)={r3}) 00:14:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:18 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x2, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x9, 0x80000, 0x380000, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'veth1\x00', 0xd020}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)={r3}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000100)=r4) 00:14:19 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x2, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x9, 0x80000, 0x380000, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'veth1\x00', 0xd020}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)={r3}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000100)=r4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cgroup.controllers\x00', 0x0, 0x0) 00:14:19 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="63707526350a0a0a0000010000039cd30e35cca01d3d0b0a1c60666f8dcc6d5c76fd2e9e09626b31deea1b0d3b8184872d58b62cc5b4223726b5797482fb1d83e6f82e2d6d0af3b128e9604401695c8d6c866c68a8fc80de2c4b74f41ac55d593b0906be2aaa26bd16785186f3d61afdd00427799b7ce4b70845ed9780731957b75bf0253e4d4df598be5e3d7121a60f70013200bbbe9d7235af657010520b26afa8247f3756ed4c4a34cf9040d5540acac2865fc1ce8ded62538de97482f4317a7772e66f88e5e3e7476378c091498dfde4bb73bf0a004b9ee55ba00a0f04a6b07345298ad052c3c12c62201c2349527a36fe4a7edad75fbe1fe586b178000000000000000093ab05") r1 = socket$kcm(0xa, 0x2, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x9, 0x80000, 0x380000, &(0x7f00000003c0)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'veth1\x00', 0xd020}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)={r3}) 00:14:19 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x2, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x9, 0x80000, 0x380000, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'veth1\x00', 0xd020}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)={r3}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000100)=r4) 00:14:19 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x2, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x9, 0x80000, 0x380000, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'veth1\x00', 0xd020}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)={r3}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000100)=r4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) 00:14:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:19 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x2, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x9, 0x80000, 0x380000, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'veth1\x00', 0xd020}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)={r3}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000100)=r4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) close(r3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r5, &(0x7f0000000600)={[{0x2b, 'pids'}, {0x2f, 'memory'}]}, 0xe) 00:14:19 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x2, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x9, 0x80000, 0x380000, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'veth1\x00', 0xd020}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)={r3}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000100)=r4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) close(r3) 00:14:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:19 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x2, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x9, 0x80000, 0x380000, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'veth1\x00', 0xd020}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)={r3}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000100)=r4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) close(r3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r5, &(0x7f0000000600)={[{0x2b, 'pids'}, {0x2f, 'memory'}]}, 0xe) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) 00:14:19 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x2, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x9, 0x80000, 0x380000, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'veth1\x00', 0xd020}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)={r3}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000100)=r4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) close(r3) 00:14:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='configfs\x00', 0x0, &(0x7f00000002c0)="ccde66f0daf5c861ecc273feef4b6ffaa3697805fcf1c44c81ff363165f8c7348b804cda4d41f2c7a1c9f0a631de037c52ee4e21fe2cb09f59b0812d96ca833ed62a1bafc6c973ef266322226d33f765cd1d6a150d29bc131f5ea4f74789278bc7c7cc818142ab39d3f7a8b170e38f27f541d02ce599aec7") r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) unshare(0x24020400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000940)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x80000000000, 0x0) 00:14:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:20 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='GPL\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="63707526350a0a0a0000010000039cd30e35cca01d3d0b0a1c60666f8dcc6d5c76fd2e9e09626b31deea1b0d3b8184872d58b62cc5b4223726b5797482fb1d83e6f82e2d6d0af3b128e9604401695c8d6c866c68a8fc80de2c4b74f41ac55d593b0906be2aaa26bd16785186f3d61afdd00427799b7ce4b70845ed9780731957b75bf0253e4d4df598be5e3d7121a60f70013200bbbe9d7235af657010520b26afa8247f3756ed4c4a34cf9040d5540acac2865fc1ce8ded62538de97482f4317a7772e66f88e5e3e7476378c091498dfde4bb73bf0a004b9ee55ba00a0f04a6b07345298ad052c3c12c62201c2349527a36fe4a7edad75fbe1fe586b178000000000000000093ab05") r1 = socket$kcm(0xa, 0x2, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) socket$kcm(0x29, 0x7, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x9, 0x80000, 0x380000, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'veth1\x00', 0xd020}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001100)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)={r3}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000100)=r4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) close(r3) 00:14:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:21 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:21 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) 00:14:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:26 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:27 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000280), 0x9}, 0x3c) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b", 0x51}], 0x1}, 0x0) 00:14:27 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) 00:14:27 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000280), 0x9}, 0x3c) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd", 0x3f}], 0x1}, 0x0) 00:14:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$f2fs(&(0x7f0000000100)='f2fs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000340), 0x0, 0x7}], 0x0, &(0x7f0000001680)={[{@grpquota={'grpquota'}}], [{@smackfsroot={'smackfsroot', 0x3d, '}ppp0@'}}, {@obj_type={'obj_type'}}]}) 00:14:28 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000280), 0x9}, 0x3c) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd", 0x3f}], 0x1}, 0x0) 00:14:28 executing program 5: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$f2fs(&(0x7f0000000100)='f2fs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000340)="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", 0xdf9, 0x7}], 0x0, &(0x7f0000001680)={[{@grpquota={'grpquota'}}], [{@smackfsroot={'smackfsroot', 0x3d, '}ppp0@'}}, {@obj_type={'obj_type'}}]}) [ 868.153641] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) 00:14:28 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 868.223494] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 868.248772] F2FS-fs (loop5): Unable to read 1th superblock [ 868.273876] F2FS-fs (loop5): Unable to read 2th superblock [ 868.286615] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 868.307922] F2FS-fs (loop5): Unable to read 1th superblock 00:14:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) [ 868.324702] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 868.327561] F2FS-fs (loop5): Unable to read 2th superblock 00:14:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) [ 868.366965] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 868.392506] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 [ 868.410408] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 868.447222] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 868.499719] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock 00:14:28 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:14:28 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:14:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:28 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000080), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000040)="b9800000c00f3235001000000f30f24c0f2c49e8426dc4027d3493b80800003626660f7e676d660f1678b06cc403f9dfbeb70000000bc7442400f5000000c744240284d178bcff1c24f2f347dbe1", 0x4e}], 0x1, 0x48, &(0x7f00000000c0), 0x10000000000003e9) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 868.759753] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:14:28 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 869.062697] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:14:29 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:14:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, 0xffffffffffffffff) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) 00:14:29 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, 0xffffffffffffffff) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) 00:14:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) [ 869.342817] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:14:29 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 869.524489] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:14:29 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) dup2(r0, r1) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) [ 869.617765] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 [ 869.659608] device lo left promiscuous mode [ 869.685844] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:14:29 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 869.830982] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:14:29 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)=ANY=[]) [ 869.978925] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:31 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)=ANY=[]) 00:14:31 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, 0xffffffffffffffff) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) 00:14:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, 0xffffffffffffffff) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) 00:14:31 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:14:31 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000012c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001340)) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=""/196, 0xc4) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) get_thread_area(&(0x7f0000000600)={0x0, 0x0, 0xe905d11e780bffee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) [ 871.802120] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 871.842285] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 871.872233] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:14:32 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)=ANY=[]) [ 872.067961] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 872.233983] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 872.320611] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:14:32 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:14:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) [ 872.479814] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:32 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 872.650139] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:32 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0), 0x0, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 872.767248] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:32 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec000000010000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 872.967996] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:34 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:14:34 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec000000010000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:14:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, 0xffffffffffffffff) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) 00:14:34 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000012c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001340)) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=""/196, 0xc4) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = dup2(r0, r1) get_thread_area(&(0x7f0000000600)={0x0, 0x0, 0xe905d11e780bffee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) write$P9_RWSTAT(r3, &(0x7f0000000540)={0x7}, 0x7) 00:14:34 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000012c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001340)) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=""/196, 0xc4) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) get_thread_area(&(0x7f0000000600)={0x0, 0x0, 0xe905d11e780bffee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) [ 874.834349] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:34 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec000000010000000000000000", 0x1d, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:14:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) [ 874.970348] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 874.994555] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000980), 0xffffff4d) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:35 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000", 0x2c, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 875.141911] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:14:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) [ 875.221847] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 875.287698] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 875.327160] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:14:37 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:14:37 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000", 0x2c, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:14:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:37 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000012c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001340)) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=""/196, 0xc4) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = dup2(r0, r1) get_thread_area(&(0x7f0000000600)={0x0, 0x0, 0xe905d11e780bffee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) write$P9_RWSTAT(r3, &(0x7f0000000540)={0x7}, 0x7) 00:14:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000012c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001340)) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=""/196, 0xc4) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = dup2(r0, r1) get_thread_area(&(0x7f0000000600)={0x0, 0x0, 0xe905d11e780bffee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) write$P9_RWSTAT(r3, &(0x7f0000000540)={0x7}, 0x7) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000005c0)) 00:14:37 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000012c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001340)) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=""/196, 0xc4) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) get_thread_area(&(0x7f0000000600)={0x0, 0x0, 0xe905d11e780bffee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) [ 877.926627] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:37 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:14:38 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000", 0x2c, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 878.033415] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 878.154052] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 878.186084] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 878.243200] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 00:14:38 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe", 0x33, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 878.310948] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 878.421539] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:38 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe", 0x33, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 878.736965] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:38 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe", 0x33, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 878.965751] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:39 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ff", 0x37, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 879.148083] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:39 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ff", 0x37, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 879.318068] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:39 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000012c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001340)) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=""/196, 0xc4) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = dup2(r0, r1) get_thread_area(&(0x7f0000000600)={0x0, 0x0, 0xe905d11e780bffee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) write$P9_RWSTAT(r3, &(0x7f0000000540)={0x7}, 0x7) 00:14:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000012c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001340)) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=""/196, 0xc4) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = dup2(r0, r1) get_thread_area(&(0x7f0000000600)={0x0, 0x0, 0xe905d11e780bffee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) write$P9_RWSTAT(r3, &(0x7f0000000540)={0x7}, 0x7) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000005c0)) 00:14:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000039ff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f00000015c0)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001440), 0x0, &(0x7f00000014c0)=""/254, 0xfe}, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$binfmt_aout(r2, &(0x7f0000001600)=ANY=[], 0x0) r4 = dup2(r3, r3) connect$unix(r4, &(0x7f00000001c0)=@abs, 0x6e) [ 880.150834] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 880.201450] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:14:41 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ff", 0x37, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:14:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) close(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:41 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:14:41 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000700)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="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", 0x0, 0x0) getdents(r1, &(0x7f0000000280)=""/135, 0x74f) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f00000004c0)=0xc) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x3, 0x4, 0x0, 0x0, 0x0, 0x3, 0x18, 0x1, 0x8000, 0xfffffffffffffc01, 0x2, 0x7, 0x0, 0x81, 0x0, 0x1, 0x80000001, 0x20, 0x1, 0x10001, 0x3f, 0x1, 0xfff, 0xc455, 0x100000001, 0x843, 0xa69, 0x0, 0x0, 0x0, 0x800, 0x34dc, 0x0, 0x7, 0x4b, 0x400, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}, 0x80, 0x6, 0xffffffffffffffff, 0x0, 0x101, 0x8, 0x1ff}, r2, 0xd, 0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000780)={{0x80000001, 0x3, 0x10000, 0x2}, 'syz0\x00', 0x42}) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000500)) sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="16f4e86007626ebd09816a94b4d74c12564305830ba60df87186e080ce2a5e539655e9efc63e9707", 0x28, 0x0, 0x0, 0x0) socket$inet6(0x10, 0x3, 0x0) r3 = add_key(&(0x7f0000000400)='asymmetric\x00', &(0x7f0000000540)={'syz', 0x0}, &(0x7f00000005c0)="85b683df0fa67f2acb9319a69630bb90e3ec2e7bccf6f1a69dac1e74e5b4fbaf26b18bc88a83cdabbdb151cc6049f92d1a4308bb97f423363bfa8f971533e0848dab03cebd969d4ed460809ad7d3eef2f0edc09c9e8daa31b19fcb5963bfb6f9f026628805fb5811a25cb294a1cf7afc5d767706b5f0e59ef1dfae76827c1bda7258b64171a1d232a8a6f86d955dc18406551d75bba2623b91cc35a2cbbf0e4859cf8718b7857e57459d", 0xaa, 0xfffffffffffffff9) r4 = add_key(&(0x7f0000000680)='blacklist\x00', &(0x7f00000006c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r3, r4) socket(0x0, 0x0, 0x0) r5 = gettid() ptrace(0xffffffffffffffff, r5) keyctl$get_security(0x11, r3, &(0x7f00000000c0)=""/50, 0x32) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 881.199288] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:41 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:14:41 executing program 3: futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x7ffff, &(0x7f0000000540)=ANY=[]) 00:14:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000012c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001340)) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=""/196, 0xc4) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = dup2(r0, r1) get_thread_area(&(0x7f0000000600)={0x0, 0x0, 0xe905d11e780bffee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) write$P9_RWSTAT(r3, &(0x7f0000000540)={0x7}, 0x7) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000005c0)) 00:14:41 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000700)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160d49cb6cce76c27289a4f9d097354aaa5860d2383df87526baa184d90bb7729366c17bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdeb610df42e7169f240357f735ae5fe29017e51e27252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc3cc24bd3c036e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374dc07142a1c2e9d3e2528e4fdac32bcaefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec", 0x0, 0x0) getdents(r1, &(0x7f0000000280)=""/135, 0x74f) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f00000004c0)=0xc) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x3, 0x4, 0x0, 0x0, 0x0, 0x3, 0x18, 0x1, 0x8000, 0xfffffffffffffc01, 0x2, 0x7, 0x0, 0x81, 0x0, 0x1, 0x80000001, 0x20, 0x1, 0x10001, 0x3f, 0x1, 0xfff, 0xc455, 0x100000001, 0x843, 0xa69, 0x0, 0x0, 0x0, 0x800, 0x34dc, 0x0, 0x7, 0x4b, 0x400, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}, 0x80, 0x6, 0xffffffffffffffff, 0x0, 0x101, 0x8, 0x1ff}, r2, 0xd, 0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000780)={{0x80000001, 0x3, 0x10000, 0x2}, 'syz0\x00', 0x42}) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000500)) sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="16f4e86007626ebd09816a94b4d74c12564305830ba60df87186e080ce2a5e539655e9efc63e9707", 0x28, 0x0, 0x0, 0x0) socket$inet6(0x10, 0x3, 0x0) r3 = add_key(&(0x7f0000000400)='asymmetric\x00', &(0x7f0000000540)={'syz', 0x0}, &(0x7f00000005c0)="85b683df0fa67f2acb9319a69630bb90e3ec2e7bccf6f1a69dac1e74e5b4fbaf26b18bc88a83cdabbdb151cc6049f92d1a4308bb97f423363bfa8f971533e0848dab03cebd969d4ed460809ad7d3eef2f0edc09c9e8daa31b19fcb5963bfb6f9f026628805fb5811a25cb294a1cf7afc5d767706b5f0e59ef1dfae76827c1bda7258b64171a1d232a8a6f86d955dc18406551d75bba2623b91cc35a2cbbf0e4859cf8718b7857e57459d", 0xaa, 0xfffffffffffffff9) r4 = add_key(&(0x7f0000000680)='blacklist\x00', &(0x7f00000006c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r3, r4) socket(0x0, 0x0, 0x0) r5 = gettid() ptrace(0xffffffffffffffff, r5) keyctl$get_security(0x11, r3, &(0x7f00000000c0)=""/50, 0x32) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 881.422191] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:41 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 881.585864] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 881.616258] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:14:41 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:14:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001fbc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000001780)) r0 = gettid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00'}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x14) clone(0x30000000, &(0x7f0000000440), &(0x7f00000004c0), &(0x7f0000000140), &(0x7f0000000500)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x6) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000580)={0x14, 0x49, 0x0, {0x4, 0x0, 0x6}}, 0x14) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000280)) [ 881.845368] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:41 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a}], 0x0, &(0x7f0000000180)=ANY=[]) 00:14:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) [ 882.035626] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:42 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a}], 0x0, &(0x7f0000000180)=ANY=[]) [ 882.288444] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:44 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:14:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) 00:14:44 executing program 3: r0 = socket(0x2, 0x803, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 00:14:44 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a}], 0x0, &(0x7f0000000180)=ANY=[]) 00:14:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100), 0x4) r1 = inotify_init() ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) 00:14:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) [ 884.244370] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:44 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0xffffffffffffffff) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r2, 0x0, 0x7) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x400) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0xfffffffffffffffd) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000002c0)=0x2000000000000004) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1b9) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000640), 0x4) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) ioctl$LOOP_CLR_FD(r1, 0x4c01) open(&(0x7f0000000600)='./bus\x00', 0x40, 0x140) close(r1) syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f40)={0x0, @multicast2, @local}, &(0x7f0000001f80)=0xc) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000980)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000700)=0x280) accept$packet(0xffffffffffffffff, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002340)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000024c0)={'team0\x00'}) 00:14:44 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/47, 0xfffffd49}, {&(0x7f0000000300)=""/135, 0x87}], 0x2, 0x0) 00:14:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') r1 = dup2(r0, r0) close(r1) 00:14:44 executing program 1: semop(0x0, &(0x7f0000000280)=[{0x0, 0x8}, {}], 0x2) semop(0x0, &(0x7f00000005c0)=[{0x0, 0xd9}], 0x1) 00:14:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_linger(r0, 0x1, 0x2d, &(0x7f0000000000), 0x8) 00:14:44 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000240)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000200)=[{0x22, 0x0, 0x0, 0x0, @time, {}, {0x0, 0xbf}, @connect}], 0x1c) 00:14:47 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:14:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x4000000000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[{0x3, 0xfff}, {0x4, 0x6}, {}], 0x3) 00:14:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 00:14:47 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) 00:14:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:47 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write(r0, &(0x7f00000000c0)="d4b08710", 0x4) [ 887.302128] input: syz1 as /devices/virtual/input/input87 00:14:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0xffffffffffffffff) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 00:14:47 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) readv(r0, &(0x7f0000001540)=[{&(0x7f0000001280)=""/11, 0xb}], 0x1) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffe8f, 0x0, &(0x7f0000893ff0), 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)="6c6f0000000000000000000000000200", 0x10) 00:14:47 executing program 3: 00:14:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002000)=ANY=[], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000386000)=""/195}, 0x48) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$cgroup_int(r2, &(0x7f0000000140), 0x12) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000000)) 00:14:47 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:14:47 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$P9_RLERRORu(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="e4ffffffe2d292cb3138865407"], 0xd) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000002e80)={'bridge_slave_0\x00', &(0x7f0000002f80)=ANY=[@ANYBLOB='3']}) 00:14:47 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)='L', 0x1}], 0x1}, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000000)) 00:14:47 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000004c0)={0x10, 0x0, &(0x7f0000000000)=[@clear_death={0x400c630f, 0x1}], 0x0, 0x0, &(0x7f0000000400)}) 00:14:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x40, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) [ 887.753731] binder: 4043:4044 Acquire 1 refcount change on invalid ref 0 ret -22 00:14:47 executing program 2: [ 887.810396] binder: 4043:4049 BC_CLEAR_DEATH_NOTIFICATION invalid ref 1 [ 887.851097] binder: 4043:4044 Acquire 1 refcount change on invalid ref 0 ret -22 [ 887.882905] binder: 4043:4049 BC_CLEAR_DEATH_NOTIFICATION invalid ref 1 00:14:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:48 executing program 2: 00:14:48 executing program 3: 00:14:48 executing program 0: 00:14:48 executing program 2: 00:14:48 executing program 1: 00:14:50 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:14:50 executing program 0: 00:14:50 executing program 3: 00:14:50 executing program 1: 00:14:50 executing program 2: 00:14:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:50 executing program 2: 00:14:50 executing program 1: 00:14:50 executing program 0: 00:14:50 executing program 3: 00:14:50 executing program 2: 00:14:50 executing program 0: 00:14:53 executing program 3: 00:14:53 executing program 1: 00:14:53 executing program 2: 00:14:53 executing program 0: 00:14:53 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:14:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:53 executing program 0: 00:14:53 executing program 1: 00:14:53 executing program 2: 00:14:53 executing program 3: 00:14:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="a72e9209cd7c78436d10836a0bba0dbf", 0x10) memfd_create(&(0x7f0000000200)='eql\x00', 0x4) pread64(r0, &(0x7f00000002c0)=""/4096, 0x1000, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000015c0)='IPVS\x00') readlink(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)=""/154, 0x9a) getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001880)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001840)="de00", 0xffffffffffffffff}, 0x30) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000001900)) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000001980)) 00:14:53 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:14:53 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000380)) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000500)=@ipx={0x4, 0x3, 0x0, "510ce708210b"}, 0x80, &(0x7f0000001b00), 0x0, &(0x7f0000001d80)=ANY=[]}, 0x48010) write$cgroup_type(r1, &(0x7f0000000340)='threaded\x00', 0xffffffc5) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) 00:14:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:setfiles_exec_t:s0\x00', 0x25, 0x0) 00:14:53 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$UHID_INPUT(r1, &(0x7f0000000740)={0x8, "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", 0x1000}, 0x1006) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) [ 894.030543] kauditd_printk_skb: 2 callbacks suppressed [ 894.030558] audit: type=1804 audit(893.987:217): pid=4134 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir724548071/syzkaller.tqLEa6/1526/bus" dev="sda1" ino=16637 res=1 00:14:54 executing program 1: clone(0x200, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = creat(&(0x7f0000000080)="e91f7189591e9233614b00", 0x109) r2 = dup2(r0, r1) execve(&(0x7f00000000c0)="e91f7189591e9233614b00", &(0x7f00000004c0), &(0x7f0000000400)) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f00000001c0)=ANY=[]) open$dir(&(0x7f00000001c0)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', &(0x7f0000000400), &(0x7f0000000640)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) 00:14:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:54 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:14:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:54 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 894.708132] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:14:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:54 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000012c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001340)) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=""/196, 0xc4) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = dup2(r0, r1) get_thread_area(&(0x7f0000000600)={0x0, 0x0, 0xe905d11e780bffee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) write$P9_RWSTAT(r3, &(0x7f0000000540)={0x7}, 0x7) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000005c0)) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) 00:14:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) [ 895.407938] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 00:14:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000012c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001340)) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=""/196, 0xc4) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = dup2(r0, r1) get_thread_area(&(0x7f0000000600)={0x0, 0x0, 0xe905d11e780bffee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) write$P9_RWSTAT(r3, &(0x7f0000000540)={0x7}, 0x7) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000005c0)) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) 00:14:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000012c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001340)) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=""/196, 0xc4) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = dup2(r0, r1) get_thread_area(&(0x7f0000000600)={0x0, 0x0, 0xe905d11e780bffee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) write$P9_RWSTAT(r3, &(0x7f0000000540)={0x7}, 0x7) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000005c0)) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) [ 895.493005] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:14:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:56 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 896.143362] FAULT_INJECTION: forcing a failure. [ 896.143362] name failslab, interval 1, probability 0, space 0, times 1 [ 896.168955] CPU: 0 PID: 4217 Comm: syz-executor1 Not tainted 4.20.0-rc1+ #109 [ 896.176267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 896.185728] Call Trace: [ 896.188344] dump_stack+0x244/0x39d [ 896.191996] ? dump_stack_print_info.cold.1+0x20/0x20 [ 896.197263] ? lock_downgrade+0x900/0x900 [ 896.201495] should_fail.cold.4+0xa/0x17 [ 896.205584] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 896.210742] ? lock_downgrade+0x900/0x900 [ 896.214997] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 896.220623] ? proc_fail_nth_write+0x9e/0x210 [ 896.225145] ? proc_cwd_link+0x1d0/0x1d0 [ 896.229227] ? find_held_lock+0x36/0x1c0 [ 896.233369] ? perf_trace_sched_process_exec+0x860/0x860 [ 896.238873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.244467] __should_failslab+0x124/0x180 [ 896.248772] should_failslab+0x9/0x14 [ 896.252628] __kmalloc+0x2e0/0x760 [ 896.256203] ? strncpy_from_user+0x5a0/0x5a0 [ 896.260708] ? fput+0x130/0x1a0 [ 896.264062] ? do_syscall_64+0x9a/0x820 [ 896.268065] ? __x64_sys_memfd_create+0x142/0x4f0 [ 896.272922] ? do_syscall_64+0x9a/0x820 [ 896.276922] __x64_sys_memfd_create+0x142/0x4f0 [ 896.281618] ? memfd_fcntl+0x1910/0x1910 [ 896.285721] do_syscall_64+0x1b9/0x820 [ 896.289656] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 896.295079] ? syscall_return_slowpath+0x5e0/0x5e0 [ 896.300032] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 896.304909] ? trace_hardirqs_on_caller+0x310/0x310 [ 896.309956] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 896.314990] ? prepare_exit_to_usermode+0x291/0x3b0 [ 896.320028] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 896.324893] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 896.330104] RIP: 0033:0x457569 [ 896.333317] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 896.352238] RSP: 002b:00007f41d4b6fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 896.359969] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000457569 [ 896.367253] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004bc78a [ 896.374546] RBP: 000000000072bf00 R08: 0000000020000058 R09: 00000000fbad8001 [ 896.381830] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f41d4b706d4 [ 896.389110] R13: 00000000004c4d1a R14: 00000000004d8448 R15: 0000000000000003 [ 896.667377] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 896.900219] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:14:57 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:14:57 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:14:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:14:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000012c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001340)) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=""/196, 0xc4) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = dup2(r0, r1) get_thread_area(&(0x7f0000000600)={0x0, 0x0, 0xe905d11e780bffee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) write$P9_RWSTAT(r3, &(0x7f0000000540)={0x7}, 0x7) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000005c0)) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) 00:14:57 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000012c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001340)) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=""/196, 0xc4) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = dup2(r0, r1) get_thread_area(&(0x7f0000000600)={0x0, 0x0, 0xe905d11e780bffee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) write$P9_RWSTAT(r3, &(0x7f0000000540)={0x7}, 0x7) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000005c0)) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) 00:14:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000012c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001340)) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=""/196, 0xc4) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = dup2(r0, r1) get_thread_area(&(0x7f0000000600)={0x0, 0x0, 0xe905d11e780bffee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) write$P9_RWSTAT(r3, &(0x7f0000000540)={0x7}, 0x7) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000005c0)) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) [ 897.342705] FAULT_INJECTION: forcing a failure. [ 897.342705] name failslab, interval 1, probability 0, space 0, times 0 [ 897.402390] CPU: 1 PID: 4231 Comm: syz-executor1 Not tainted 4.20.0-rc1+ #109 [ 897.409709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 897.419072] Call Trace: [ 897.421693] dump_stack+0x244/0x39d [ 897.425351] ? dump_stack_print_info.cold.1+0x20/0x20 [ 897.430577] should_fail.cold.4+0xa/0x17 [ 897.434681] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 897.439816] ? find_held_lock+0x36/0x1c0 [ 897.443903] ? zap_class+0x640/0x640 [ 897.447631] ? __lock_acquire+0x62f/0x4c20 [ 897.451906] ? lock_downgrade+0x900/0x900 [ 897.456138] ? check_preemption_disabled+0x48/0x280 [ 897.461183] ? find_held_lock+0x36/0x1c0 [ 897.465335] ? expand_files.part.8+0x571/0x9a0 [ 897.469937] ? perf_trace_sched_process_exec+0x860/0x860 [ 897.475407] ? find_held_lock+0x36/0x1c0 [ 897.479515] __should_failslab+0x124/0x180 [ 897.483784] should_failslab+0x9/0x14 [ 897.487600] kmem_cache_alloc+0x2be/0x730 [ 897.491811] ? shmem_destroy_callback+0xc0/0xc0 [ 897.496500] shmem_alloc_inode+0x1b/0x40 [ 897.500578] alloc_inode+0x63/0x190 [ 897.504226] new_inode_pseudo+0x71/0x1a0 [ 897.508348] ? prune_icache_sb+0x1c0/0x1c0 [ 897.512645] ? _raw_spin_unlock+0x2c/0x50 [ 897.516826] new_inode+0x1c/0x40 [ 897.520218] shmem_get_inode+0xf1/0x920 [ 897.524217] ? shmem_encode_fh+0x340/0x340 [ 897.528475] ? lock_downgrade+0x900/0x900 [ 897.532644] ? lock_release+0xa00/0xa00 [ 897.536676] ? perf_trace_sched_process_exec+0x860/0x860 [ 897.542146] ? usercopy_warn+0x110/0x110 [ 897.546237] __shmem_file_setup.part.50+0x83/0x2a0 [ 897.551195] shmem_file_setup+0x65/0x90 [ 897.555196] __x64_sys_memfd_create+0x2af/0x4f0 [ 897.559908] ? memfd_fcntl+0x1910/0x1910 [ 897.564009] do_syscall_64+0x1b9/0x820 [ 897.567914] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 897.573295] ? syscall_return_slowpath+0x5e0/0x5e0 [ 897.578242] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 897.583108] ? trace_hardirqs_on_caller+0x310/0x310 [ 897.588147] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 897.593183] ? prepare_exit_to_usermode+0x291/0x3b0 [ 897.598224] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 897.603087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 897.608289] RIP: 0033:0x457569 [ 897.611497] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 897.630886] RSP: 002b:00007f41d4b6fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 897.638618] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000457569 [ 897.645896] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004bc78a 00:14:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000012c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001340)) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=""/196, 0xc4) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = dup2(r0, r1) get_thread_area(&(0x7f0000000600)={0x0, 0x0, 0xe905d11e780bffee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) write$P9_RWSTAT(r3, &(0x7f0000000540)={0x7}, 0x7) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000005c0)) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) [ 897.653179] RBP: 000000000072bf00 R08: 0000000020000058 R09: 00000000fbad8001 [ 897.660468] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f41d4b706d4 [ 897.667767] R13: 00000000004c4d1a R14: 00000000004d8448 R15: 0000000000000003 [ 897.694279] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:14:57 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 897.825262] FAULT_INJECTION: forcing a failure. [ 897.825262] name failslab, interval 1, probability 0, space 0, times 0 [ 897.837030] CPU: 0 PID: 4250 Comm: syz-executor1 Not tainted 4.20.0-rc1+ #109 [ 897.844320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 897.853688] Call Trace: [ 897.856296] dump_stack+0x244/0x39d [ 897.857929] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 897.859974] ? dump_stack_print_info.cold.1+0x20/0x20 [ 897.860019] ? find_held_lock+0x36/0x1c0 [ 897.875519] should_fail.cold.4+0xa/0x17 [ 897.879602] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 897.881465] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 897.884812] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 897.884834] ? kasan_check_read+0x11/0x20 [ 897.900407] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 897.905705] ? rcu_softirq_qs+0x20/0x20 [ 897.909702] ? rcu_softirq_qs+0x20/0x20 [ 897.913734] ? unwind_dump+0x190/0x190 [ 897.917713] ? is_bpf_text_address+0xd3/0x170 [ 897.922273] ? kernel_text_address+0x79/0xf0 [ 897.926711] ? __kernel_text_address+0xd/0x40 [ 897.931226] ? unwind_get_return_address+0x61/0xa0 [ 897.936195] ? __save_stack_trace+0x8d/0xf0 [ 897.940553] ? perf_trace_sched_process_exec+0x860/0x860 [ 897.946046] ? save_stack+0x43/0xd0 [ 897.949710] ? kasan_kmalloc+0xc7/0xe0 [ 897.953614] ? kasan_slab_alloc+0x12/0x20 [ 897.957774] ? kmem_cache_alloc+0x12e/0x730 [ 897.962109] ? shmem_alloc_inode+0x1b/0x40 [ 897.966371] __should_failslab+0x124/0x180 [ 897.970645] should_failslab+0x9/0x14 [ 897.974480] kmem_cache_alloc+0x2be/0x730 [ 897.978647] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 897.983736] ? map_id_range_down+0x1ee/0x430 [ 897.988230] new_inode_smack+0x20/0xb0 [ 897.992139] smack_inode_alloc_security+0x92/0x100 [ 897.997120] security_inode_alloc+0x73/0xd0 [ 898.001472] inode_init_always+0x68f/0xd80 [ 898.005721] ? get_nr_inodes+0x120/0x120 [ 898.009843] ? rcu_pm_notify+0xc0/0xc0 [ 898.013774] ? rcu_read_lock_sched_held+0x14f/0x180 [ 898.018804] ? kmem_cache_alloc+0x33a/0x730 [ 898.023143] ? shmem_alloc_inode+0x1b/0x40 [ 898.027389] ? shmem_destroy_callback+0xc0/0xc0 [ 898.032083] alloc_inode+0x80/0x190 [ 898.035730] new_inode_pseudo+0x71/0x1a0 [ 898.039804] ? prune_icache_sb+0x1c0/0x1c0 [ 898.044062] ? _raw_spin_unlock+0x2c/0x50 [ 898.048231] new_inode+0x1c/0x40 [ 898.051613] shmem_get_inode+0xf1/0x920 [ 898.055611] ? shmem_encode_fh+0x340/0x340 [ 898.059866] ? lock_downgrade+0x900/0x900 [ 898.064033] ? lock_release+0xa00/0xa00 [ 898.068118] ? perf_trace_sched_process_exec+0x860/0x860 [ 898.073586] ? usercopy_warn+0x110/0x110 [ 898.077687] __shmem_file_setup.part.50+0x83/0x2a0 [ 898.082639] shmem_file_setup+0x65/0x90 [ 898.086640] __x64_sys_memfd_create+0x2af/0x4f0 [ 898.091332] ? memfd_fcntl+0x1910/0x1910 [ 898.095418] do_syscall_64+0x1b9/0x820 [ 898.099321] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 898.104711] ? syscall_return_slowpath+0x5e0/0x5e0 [ 898.109653] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 898.109686] ? trace_hardirqs_on_caller+0x310/0x310 [ 898.109711] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 898.124568] ? prepare_exit_to_usermode+0x291/0x3b0 [ 898.129613] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 898.134475] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 898.139701] RIP: 0033:0x457569 [ 898.142903] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 898.142912] RSP: 002b:00007f41d4b6fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 898.142934] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000457569 [ 898.142949] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004bc78a [ 898.184092] RBP: 000000000072bf00 R08: 0000000020000058 R09: 00000000fbad8001 [ 898.191370] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f41d4b706d4 [ 898.198659] R13: 00000000004c4d1a R14: 00000000004d8448 R15: 0000000000000003 00:14:58 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:14:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) [ 898.333084] FAULT_INJECTION: forcing a failure. [ 898.333084] name failslab, interval 1, probability 0, space 0, times 0 [ 898.372347] CPU: 0 PID: 4256 Comm: syz-executor1 Not tainted 4.20.0-rc1+ #109 [ 898.379687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 898.389042] Call Trace: [ 898.391642] dump_stack+0x244/0x39d [ 898.395300] ? dump_stack_print_info.cold.1+0x20/0x20 [ 898.400518] should_fail.cold.4+0xa/0x17 [ 898.404592] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 898.409711] ? __kernel_text_address+0xd/0x40 [ 898.414219] ? unwind_get_return_address+0x61/0xa0 [ 898.419164] ? __lockdep_init_map+0x105/0x590 [ 898.423699] ? lockdep_init_map+0x9/0x10 [ 898.427772] ? debug_mutex_init+0x2d/0x60 [ 898.431939] ? find_held_lock+0x36/0x1c0 [ 898.436034] ? perf_trace_sched_process_exec+0x860/0x860 [ 898.441513] __should_failslab+0x124/0x180 [ 898.445768] should_failslab+0x9/0x14 [ 898.449592] kmem_cache_alloc+0x2be/0x730 [ 898.453768] ? mpol_shared_policy_init+0x235/0x650 [ 898.458732] ? current_time+0x72/0x1b0 [ 898.462638] __d_alloc+0xc8/0xb90 [ 898.466128] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 898.471158] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 898.476250] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 898.481456] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.487018] ? timespec64_trunc+0xea/0x180 [ 898.491265] ? inode_init_owner+0x340/0x340 [ 898.495599] ? _raw_spin_unlock+0x2c/0x50 [ 898.499779] ? current_time+0x131/0x1b0 [ 898.503764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.509321] ? __lockdep_init_map+0x105/0x590 [ 898.514091] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 898.519633] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 898.525210] d_alloc_pseudo+0x1d/0x30 [ 898.529027] alloc_file_pseudo+0x158/0x3f0 [ 898.533276] ? alloc_file+0x4d0/0x4d0 [ 898.537089] ? usercopy_warn+0x110/0x110 [ 898.541179] __shmem_file_setup.part.50+0x110/0x2a0 [ 898.546226] shmem_file_setup+0x65/0x90 [ 898.550213] __x64_sys_memfd_create+0x2af/0x4f0 [ 898.554896] ? memfd_fcntl+0x1910/0x1910 [ 898.558985] do_syscall_64+0x1b9/0x820 [ 898.562897] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 898.568276] ? syscall_return_slowpath+0x5e0/0x5e0 [ 898.573226] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 898.578080] ? trace_hardirqs_on_caller+0x310/0x310 [ 898.583096] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 898.588104] ? prepare_exit_to_usermode+0x291/0x3b0 [ 898.593123] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 898.597988] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 898.603180] RIP: 0033:0x457569 [ 898.606361] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 898.625250] RSP: 002b:00007f41d4b6fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 00:14:58 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 898.632950] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000457569 [ 898.640205] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004bc78a [ 898.647469] RBP: 000000000072bf00 R08: 0000000020000058 R09: 00000000fbad8001 [ 898.654742] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f41d4b706d4 [ 898.661995] R13: 00000000004c4d1a R14: 00000000004d8448 R15: 0000000000000003 [ 898.756133] FAULT_INJECTION: forcing a failure. [ 898.756133] name failslab, interval 1, probability 0, space 0, times 0 [ 898.767866] CPU: 0 PID: 4261 Comm: syz-executor1 Not tainted 4.20.0-rc1+ #109 [ 898.775155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 898.784520] Call Trace: [ 898.787122] dump_stack+0x244/0x39d [ 898.790786] ? dump_stack_print_info.cold.1+0x20/0x20 [ 898.796024] ? __save_stack_trace+0x8d/0xf0 [ 898.800384] should_fail.cold.4+0xa/0x17 [ 898.804468] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 898.809587] ? smack_d_instantiate+0x136/0xea0 [ 898.813577] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 898.814183] ? save_stack+0x43/0xd0 [ 898.814199] ? kasan_kmalloc+0xc7/0xe0 [ 898.814225] ? find_held_lock+0x36/0x1c0 [ 898.832271] ? zap_class+0x640/0x640 [ 898.836019] ? find_held_lock+0x36/0x1c0 [ 898.840100] ? __fpu__restore_sig+0x1678/0x1680 [ 898.844804] ? perf_trace_sched_process_exec+0x860/0x860 [ 898.850270] ? lock_downgrade+0x900/0x900 [ 898.854438] __should_failslab+0x124/0x180 [ 898.858698] should_failslab+0x9/0x14 [ 898.862554] kmem_cache_alloc+0x2be/0x730 [ 898.866743] ? d_set_d_op+0x31d/0x410 [ 898.870583] __alloc_file+0xa8/0x470 [ 898.874308] ? file_free_rcu+0xd0/0xd0 [ 898.878211] ? d_instantiate+0x79/0xa0 [ 898.882119] ? lock_downgrade+0x900/0x900 [ 898.886292] ? kasan_check_read+0x11/0x20 [ 898.890523] ? do_raw_spin_unlock+0xa7/0x330 [ 898.894957] ? do_raw_spin_trylock+0x270/0x270 [ 898.899556] alloc_empty_file+0x72/0x170 [ 898.903632] alloc_file+0x5e/0x4d0 [ 898.907192] ? _raw_spin_unlock+0x2c/0x50 [ 898.911359] alloc_file_pseudo+0x261/0x3f0 [ 898.915616] ? alloc_file+0x4d0/0x4d0 [ 898.919435] ? usercopy_warn+0x110/0x110 [ 898.923525] __shmem_file_setup.part.50+0x110/0x2a0 [ 898.928560] shmem_file_setup+0x65/0x90 [ 898.932544] __x64_sys_memfd_create+0x2af/0x4f0 [ 898.937222] ? memfd_fcntl+0x1910/0x1910 [ 898.941310] do_syscall_64+0x1b9/0x820 [ 898.945213] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 898.950592] ? syscall_return_slowpath+0x5e0/0x5e0 [ 898.955531] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 898.960388] ? trace_hardirqs_on_caller+0x310/0x310 [ 898.965420] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 898.970453] ? prepare_exit_to_usermode+0x291/0x3b0 [ 898.975501] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 898.980361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 898.985572] RIP: 0033:0x457569 [ 898.988783] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 899.007702] RSP: 002b:00007f41d4b6fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 899.015428] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000457569 [ 899.022731] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004bc78a [ 899.030017] RBP: 000000000072bf00 R08: 0000000020000058 R09: 00000000fbad8001 [ 899.037297] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f41d4b706d4 [ 899.044573] R13: 00000000004c4d1a R14: 00000000004d8448 R15: 0000000000000003 00:14:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:00 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:00 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:00 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000012c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001340)) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=""/196, 0xc4) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = dup2(r0, r1) get_thread_area(&(0x7f0000000600)={0x0, 0x0, 0xe905d11e780bffee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) write$P9_RWSTAT(r3, &(0x7f0000000540)={0x7}, 0x7) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000005c0)) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) 00:15:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:00 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000012c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001340)) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) llistxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=""/196, 0xc4) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = dup2(r0, r1) get_thread_area(&(0x7f0000000600)={0x0, 0x0, 0xe905d11e780bffee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000740)=""/21) write$P9_RWSTAT(r3, &(0x7f0000000540)={0x7}, 0x7) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f00000005c0)) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) 00:15:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) [ 900.423724] FAULT_INJECTION: forcing a failure. [ 900.423724] name fail_page_alloc, interval 1, probability 0, space 0, times 1 00:15:00 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 900.489846] CPU: 1 PID: 4279 Comm: syz-executor1 Not tainted 4.20.0-rc1+ #109 [ 900.497151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 900.506505] Call Trace: [ 900.509128] dump_stack+0x244/0x39d [ 900.512979] ? dump_stack_print_info.cold.1+0x20/0x20 [ 900.518231] ? __lock_acquire+0x62f/0x4c20 [ 900.522497] should_fail.cold.4+0xa/0x17 [ 900.526582] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 900.531716] ? zap_class+0x640/0x640 [ 900.535462] ? zap_class+0x640/0x640 [ 900.539205] ? __lock_is_held+0xb5/0x140 [ 900.543309] ? __lock_is_held+0xb5/0x140 [ 900.547400] ? lock_release+0xa00/0xa00 [ 900.551399] ? perf_trace_sched_process_exec+0x860/0x860 [ 900.556869] ? rcu_softirq_qs+0x20/0x20 [ 900.560872] ? __might_sleep+0x95/0x190 [ 900.564963] __alloc_pages_nodemask+0x34b/0xde0 [ 900.569658] ? __alloc_pages_slowpath+0x2e10/0x2e10 [ 900.574730] ? __lock_acquire+0x62f/0x4c20 [ 900.578983] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.584539] ? check_preemption_disabled+0x48/0x280 [ 900.589576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.595130] ? percpu_counter_add_batch+0x141/0x190 [ 900.600170] ? mpol_shared_policy_lookup+0xf7/0x150 [ 900.605382] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 900.610972] alloc_pages_vma+0x11e/0x4a0 [ 900.615063] shmem_alloc_page+0xa5/0x190 [ 900.619143] ? shmem_swapin+0x230/0x230 [ 900.623167] shmem_alloc_and_acct_page+0x248/0xdb0 [ 900.628121] ? shmem_getattr+0x2c0/0x2c0 [ 900.632201] ? print_usage_bug+0xc0/0xc0 [ 900.636301] ? mark_held_locks+0x130/0x130 [ 900.640566] ? lock_release+0xa00/0xa00 [ 900.644555] ? rcu_softirq_qs+0x20/0x20 [ 900.648540] ? rcu_softirq_qs+0x20/0x20 [ 900.652526] ? unwind_dump+0x190/0x190 [ 900.656443] ? __lock_acquire+0x62f/0x4c20 [ 900.660712] ? lock_unpin_lock+0x4a0/0x4a0 [ 900.664990] ? __lock_acquire+0x62f/0x4c20 [ 900.669239] ? __mutex_lock+0x85e/0x16f0 [ 900.673319] ? print_usage_bug+0xc0/0xc0 [ 900.677397] shmem_getpage_gfp+0x71d/0x4840 [ 900.681799] ? find_held_lock+0x36/0x1c0 [ 900.685879] ? shmem_add_to_page_cache+0x1950/0x1950 [ 900.691000] ? print_usage_bug+0xc0/0xc0 [ 900.695074] ? mark_held_locks+0xc7/0x130 [ 900.699267] ? print_usage_bug+0xc0/0xc0 [ 900.703343] ? print_usage_bug+0xc0/0xc0 [ 900.707422] ? print_usage_bug+0xc0/0xc0 [ 900.711508] ? mark_held_locks+0x130/0x130 [ 900.715782] ? print_usage_bug+0xc0/0xc0 [ 900.719914] ? ima_match_policy+0x848/0x1560 [ 900.724351] ? __lock_acquire+0x62f/0x4c20 [ 900.728599] ? __lock_acquire+0x62f/0x4c20 [ 900.732859] ? print_usage_bug+0xc0/0xc0 [ 900.736945] ? mark_held_locks+0x130/0x130 [ 900.741210] ? print_usage_bug+0xc0/0xc0 [ 900.745296] ? print_usage_bug+0xc0/0xc0 [ 900.749375] ? mark_held_locks+0x130/0x130 [ 900.753636] ? lock_unpin_lock+0x4a0/0x4a0 [ 900.757930] ? __lock_acquire+0x62f/0x4c20 [ 900.762187] ? mark_held_locks+0x130/0x130 [ 900.766447] ? print_usage_bug+0xc0/0xc0 [ 900.770534] ? __lock_acquire+0x62f/0x4c20 [ 900.774795] ? mark_held_locks+0x130/0x130 [ 900.779055] ? mark_held_locks+0x130/0x130 [ 900.783304] ? print_usage_bug+0xc0/0xc0 [ 900.787393] ? print_usage_bug+0xc0/0xc0 [ 900.791475] ? __lock_acquire+0x62f/0x4c20 [ 900.795760] ? print_usage_bug+0xc0/0xc0 [ 900.799866] ? find_held_lock+0x36/0x1c0 [ 900.803950] ? __lock_acquire+0x62f/0x4c20 [ 900.808221] ? __lock_acquire+0x62f/0x4c20 [ 900.812474] ? zap_class+0x640/0x640 [ 900.816206] ? __lock_acquire+0x62f/0x4c20 [ 900.820467] ? zap_class+0x640/0x640 [ 900.824200] ? print_usage_bug+0xc0/0xc0 [ 900.828292] ? find_held_lock+0x36/0x1c0 [ 900.832379] ? find_held_lock+0x36/0x1c0 [ 900.836476] ? mark_held_locks+0xc7/0x130 [ 900.840646] ? ktime_get_coarse_real_ts64+0x273/0x370 [ 900.845863] ? ktime_get_coarse_real_ts64+0x273/0x370 [ 900.851066] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 900.855686] ? trace_hardirqs_on+0xbd/0x310 [ 900.860025] ? current_time+0x72/0x1b0 [ 900.863956] ? trace_hardirqs_off_caller+0x310/0x310 [ 900.869078] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 900.874629] ? iov_iter_fault_in_readable+0x22a/0x450 [ 900.879906] ? _copy_from_iter_flushcache+0xfc0/0xfc0 [ 900.885113] ? write_comp_data+0x55/0x70 [ 900.889191] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 900.894405] shmem_write_begin+0x10a/0x1e0 [ 900.898682] generic_perform_write+0x3aa/0x6a0 [ 900.903293] ? add_page_wait_queue+0x400/0x400 [ 900.907893] ? file_update_time+0xe4/0x640 [ 900.912145] ? current_time+0x1b0/0x1b0 [ 900.916141] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 900.921174] ? generic_write_check_limits+0x28d/0x370 [ 900.926404] __generic_file_write_iter+0x26e/0x630 [ 900.931366] generic_file_write_iter+0x34d/0x6b0 [ 900.936150] ? __generic_file_write_iter+0x630/0x630 [ 900.941269] ? do_truncate+0x1ee/0x2d0 [ 900.945170] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 900.950720] ? iov_iter_init+0xe5/0x210 [ 900.954718] __vfs_write+0x6b8/0x9f0 [ 900.958457] ? kernel_read+0x120/0x120 [ 900.962366] ? __lock_is_held+0xb5/0x140 [ 900.966476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.972033] ? __sb_start_write+0x1b2/0x370 [ 900.976373] vfs_write+0x1fc/0x560 [ 900.979935] ksys_pwrite64+0x181/0x1b0 [ 900.983853] ? __ia32_sys_pread64+0xf0/0xf0 [ 900.988186] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 900.993757] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 900.999137] ? trace_hardirqs_off_caller+0x310/0x310 [ 901.004264] ? do_sys_ftruncate+0x449/0x550 [ 901.008611] __x64_sys_pwrite64+0x97/0xf0 [ 901.012785] do_syscall_64+0x1b9/0x820 [ 901.016694] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 901.022071] ? syscall_return_slowpath+0x5e0/0x5e0 [ 901.027012] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 901.031874] ? trace_hardirqs_on_caller+0x310/0x310 [ 901.036912] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 901.041944] ? prepare_exit_to_usermode+0x291/0x3b0 [ 901.046981] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 901.051849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 901.057052] RIP: 0033:0x411207 [ 901.060269] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 901.079180] RSP: 002b:00007f41d4b6fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 901.086899] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000411207 [ 901.094176] RDX: 000000000000003a RSI: 00000000200002c0 RDI: 0000000000000004 [ 901.101457] RBP: 0000000000000000 R08: 0000000020000058 R09: 00000000fbad8001 [ 901.108733] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 901.116010] R13: 0000000000000001 R14: 00000000004d8448 R15: 0000000000000003 [ 901.198005] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 901.226105] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 00:15:01 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:01 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:01 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 901.530092] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:01 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='\nxt4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:01 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:02 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:02 executing program 3 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:02 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='%xt4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:02 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:02 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ex\n4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:02 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 00:15:02 executing program 2 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:02 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) [ 902.968293] FAULT_INJECTION: forcing a failure. [ 902.968293] name failslab, interval 1, probability 0, space 0, times 0 [ 902.995021] CPU: 0 PID: 4385 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #109 [ 903.002318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 903.011686] Call Trace: [ 903.014301] dump_stack+0x244/0x39d [ 903.017965] ? dump_stack_print_info.cold.1+0x20/0x20 [ 903.023189] ? __lock_acquire+0x62f/0x4c20 [ 903.027451] should_fail.cold.4+0xa/0x17 [ 903.031525] ? find_held_lock+0x36/0x1c0 [ 903.035607] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 903.040742] ? __fget+0x4aa/0x740 [ 903.044209] ? lock_downgrade+0x900/0x900 [ 903.044228] ? check_preemption_disabled+0x48/0x280 [ 903.044250] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 903.044268] ? kasan_check_read+0x11/0x20 [ 903.044283] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 903.044301] ? rcu_softirq_qs+0x20/0x20 [ 903.071745] ? find_held_lock+0x36/0x1c0 [ 903.075851] ? perf_trace_sched_process_exec+0x860/0x860 [ 903.081318] ? zap_class+0x640/0x640 [ 903.085058] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 903.090602] __should_failslab+0x124/0x180 [ 903.094841] should_failslab+0x9/0x14 [ 903.098655] __kmalloc+0x2e0/0x760 [ 903.102284] ? bpf_test_init.isra.10+0x98/0x100 [ 903.106972] bpf_test_init.isra.10+0x98/0x100 [ 903.111483] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 903.116334] bpf_prog_test_run_skb+0x109/0xcb0 [ 903.120936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 903.126514] ? cap_capable+0x1f9/0x260 [ 903.130418] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 903.135261] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 903.140798] ? fput+0x130/0x1a0 [ 903.144078] ? __bpf_prog_get+0x9b/0x290 [ 903.148145] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 903.152986] bpf_prog_test_run+0x130/0x1a0 [ 903.157221] __x64_sys_bpf+0x3d8/0x520 [ 903.161124] ? bpf_prog_get+0x20/0x20 [ 903.164961] do_syscall_64+0x1b9/0x820 [ 903.168860] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 903.174224] ? syscall_return_slowpath+0x5e0/0x5e0 [ 903.179149] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 903.183997] ? trace_hardirqs_on_caller+0x310/0x310 [ 903.189022] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 903.194048] ? prepare_exit_to_usermode+0x291/0x3b0 [ 903.199075] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 903.203933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 903.209131] RIP: 0033:0x457569 [ 903.212326] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 903.231228] RSP: 002b:00007f676eaf0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 903.238945] RAX: ffffffffffffffda RBX: 00007f676eaf0c90 RCX: 0000000000457569 [ 903.246212] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 903.253485] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 903.260755] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f676eaf16d4 [ 903.268023] R13: 00000000004bd892 R14: 00000000004cc568 R15: 0000000000000005 00:15:03 executing program 0 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:03 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ex%4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:03 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 00:15:03 executing program 2 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:03 executing program 5: r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 903.610825] FAULT_INJECTION: forcing a failure. [ 903.610825] name failslab, interval 1, probability 0, space 0, times 0 [ 903.649766] CPU: 1 PID: 4419 Comm: syz-executor0 Not tainted 4.20.0-rc1+ #109 [ 903.657068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 903.666443] Call Trace: [ 903.669041] dump_stack+0x244/0x39d [ 903.672690] ? dump_stack_print_info.cold.1+0x20/0x20 [ 903.678654] ? __lock_acquire+0x62f/0x4c20 [ 903.682919] should_fail.cold.4+0xa/0x17 [ 903.686984] ? find_held_lock+0x36/0x1c0 [ 903.691052] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 903.696175] ? __fget+0x4aa/0x740 [ 903.699647] ? lock_downgrade+0x900/0x900 [ 903.703805] ? check_preemption_disabled+0x48/0x280 [ 903.708839] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 903.713769] ? kasan_check_read+0x11/0x20 [ 903.717916] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 903.723195] ? rcu_softirq_qs+0x20/0x20 [ 903.727175] ? find_held_lock+0x36/0x1c0 [ 903.731287] ? perf_trace_sched_process_exec+0x860/0x860 [ 903.736766] ? zap_class+0x640/0x640 [ 903.740488] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 903.746033] __should_failslab+0x124/0x180 [ 903.750275] should_failslab+0x9/0x14 [ 903.754076] __kmalloc+0x2e0/0x760 [ 903.757626] ? bpf_test_init.isra.10+0x98/0x100 [ 903.762300] bpf_test_init.isra.10+0x98/0x100 [ 903.766802] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 903.771647] bpf_prog_test_run_skb+0x109/0xcb0 [ 903.776261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 903.781824] ? cap_capable+0x1f9/0x260 [ 903.785728] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 903.790574] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 903.796111] ? fput+0x130/0x1a0 [ 903.799393] ? __bpf_prog_get+0x9b/0x290 [ 903.803469] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 903.808325] bpf_prog_test_run+0x130/0x1a0 [ 903.812562] __x64_sys_bpf+0x3d8/0x520 [ 903.816479] ? bpf_prog_get+0x20/0x20 [ 903.820320] do_syscall_64+0x1b9/0x820 [ 903.824209] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 903.829575] ? syscall_return_slowpath+0x5e0/0x5e0 [ 903.834506] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 903.839358] ? trace_hardirqs_on_caller+0x310/0x310 [ 903.844382] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 903.849421] ? prepare_exit_to_usermode+0x291/0x3b0 [ 903.854466] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 903.859320] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 903.864509] RIP: 0033:0x457569 [ 903.867709] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 903.886608] RSP: 002b:00007f20c2c38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 903.894315] RAX: ffffffffffffffda RBX: 00007f20c2c38c90 RCX: 0000000000457569 [ 903.901626] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a 00:15:03 executing program 5: r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 903.908896] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 903.916189] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20c2c396d4 [ 903.923454] R13: 00000000004bd892 R14: 00000000004cc568 R15: 0000000000000005 00:15:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:03 executing program 5: r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:04 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='extI\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:04 executing program 0 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:04 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:04 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext-\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 904.407211] FAULT_INJECTION: forcing a failure. [ 904.407211] name failslab, interval 1, probability 0, space 0, times 0 [ 904.435494] CPU: 0 PID: 4460 Comm: syz-executor0 Not tainted 4.20.0-rc1+ #109 [ 904.442784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 904.452146] Call Trace: [ 904.454773] dump_stack+0x244/0x39d [ 904.458436] ? dump_stack_print_info.cold.1+0x20/0x20 [ 904.463680] should_fail.cold.4+0xa/0x17 [ 904.467775] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 904.472896] ? save_stack+0x43/0xd0 [ 904.476546] ? kasan_kmalloc+0xc7/0xe0 [ 904.480450] ? __kmalloc+0x15b/0x760 [ 904.484175] ? bpf_test_init.isra.10+0x98/0x100 [ 904.488863] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 904.494151] ? rcu_softirq_qs+0x20/0x20 [ 904.498151] ? find_held_lock+0x36/0x1c0 [ 904.502230] ? find_held_lock+0x36/0x1c0 [ 904.506327] ? perf_trace_sched_process_exec+0x860/0x860 [ 904.512010] __should_failslab+0x124/0x180 [ 904.516259] should_failslab+0x9/0x14 [ 904.520078] kmem_cache_alloc_trace+0x2d7/0x750 [ 904.524766] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 904.530318] ? bpf_test_init.isra.10+0x70/0x100 [ 904.535003] bpf_prog_test_run_skb+0x1da/0xcb0 [ 904.539599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 904.545148] ? cap_capable+0x1f9/0x260 [ 904.549053] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 904.553912] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 904.559463] ? fput+0x130/0x1a0 [ 904.562755] ? __bpf_prog_get+0x9b/0x290 [ 904.566832] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 904.571693] bpf_prog_test_run+0x130/0x1a0 [ 904.575953] __x64_sys_bpf+0x3d8/0x520 [ 904.579851] ? bpf_prog_get+0x20/0x20 [ 904.583691] do_syscall_64+0x1b9/0x820 [ 904.587590] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 904.592966] ? syscall_return_slowpath+0x5e0/0x5e0 [ 904.597913] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 904.602780] ? trace_hardirqs_on_caller+0x310/0x310 [ 904.607817] ? prepare_exit_to_usermode+0x291/0x3b0 [ 904.612849] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 904.617730] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 904.622937] RIP: 0033:0x457569 [ 904.626147] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 904.645056] RSP: 002b:00007f20c2c38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 904.652788] RAX: ffffffffffffffda RBX: 00007f20c2c38c90 RCX: 0000000000457569 [ 904.660068] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 904.667342] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 904.674619] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20c2c396d4 [ 904.681894] R13: 00000000004bd892 R14: 00000000004cc568 R15: 0000000000000005 00:15:04 executing program 0 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:04 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:04 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext\n\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 904.910037] FAULT_INJECTION: forcing a failure. [ 904.910037] name failslab, interval 1, probability 0, space 0, times 0 [ 905.021784] CPU: 1 PID: 4494 Comm: syz-executor0 Not tainted 4.20.0-rc1+ #109 [ 905.029117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 905.038485] Call Trace: [ 905.041097] dump_stack+0x244/0x39d [ 905.044755] ? dump_stack_print_info.cold.1+0x20/0x20 [ 905.049978] ? kasan_check_read+0x11/0x20 [ 905.054149] ? __debug_object_init+0x57d/0x1290 [ 905.058842] ? trace_hardirqs_off_caller+0x310/0x310 [ 905.063978] should_fail.cold.4+0xa/0x17 [ 905.068063] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 905.073180] ? __debug_object_init+0x57d/0x1290 [ 905.077864] ? rcu_softirq_qs+0x20/0x20 [ 905.081847] ? unwind_dump+0x190/0x190 [ 905.085757] ? debug_object_free+0x690/0x690 [ 905.090180] ? is_bpf_text_address+0xd3/0x170 [ 905.094706] ? kernel_text_address+0x79/0xf0 [ 905.099132] ? __kernel_text_address+0xd/0x40 [ 905.103636] ? unwind_get_return_address+0x61/0xa0 [ 905.108593] ? __save_stack_trace+0x8d/0xf0 [ 905.112944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 905.118510] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 905.124062] ? rcu_pm_notify+0xc0/0xc0 [ 905.127982] __should_failslab+0x124/0x180 [ 905.132260] should_failslab+0x9/0x14 [ 905.136119] kmem_cache_alloc+0x47/0x730 [ 905.140198] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 905.145823] ? __phys_addr+0xa6/0x120 [ 905.149658] ? kasan_unpoison_shadow+0x35/0x50 [ 905.154354] __build_skb+0xab/0x430 [ 905.157996] ? skb_try_coalesce+0x1b70/0x1b70 [ 905.162518] ? kasan_check_write+0x14/0x20 [ 905.166770] ? sock_init_data+0x9b1/0xdc0 [ 905.170952] ? rcu_pm_notify+0xc0/0xc0 [ 905.174880] ? sk_stop_timer+0x50/0x50 [ 905.178789] build_skb+0x77/0x270 [ 905.182257] ? rcu_read_lock_sched_held+0x14f/0x180 [ 905.187294] ? __build_skb+0x430/0x430 [ 905.191201] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 905.196752] ? bpf_test_init.isra.10+0x70/0x100 [ 905.201447] bpf_prog_test_run_skb+0x289/0xcb0 [ 905.206041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 905.211596] ? cap_capable+0x1f9/0x260 [ 905.215504] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 905.220358] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 905.225907] ? fput+0x130/0x1a0 [ 905.229201] ? __bpf_prog_get+0x9b/0x290 [ 905.233288] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 905.238152] bpf_prog_test_run+0x130/0x1a0 [ 905.242405] __x64_sys_bpf+0x3d8/0x520 [ 905.246306] ? bpf_prog_get+0x20/0x20 [ 905.250142] do_syscall_64+0x1b9/0x820 [ 905.254046] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 905.259433] ? syscall_return_slowpath+0x5e0/0x5e0 [ 905.264381] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 905.269251] ? trace_hardirqs_on_caller+0x310/0x310 [ 905.274293] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 905.279328] ? prepare_exit_to_usermode+0x291/0x3b0 [ 905.284369] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 905.289232] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 905.294444] RIP: 0033:0x457569 [ 905.297652] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:15:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 905.316572] RSP: 002b:00007f20c2c38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 905.324308] RAX: ffffffffffffffda RBX: 00007f20c2c38c90 RCX: 0000000000457569 [ 905.331587] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 905.338862] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 905.346140] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20c2c396d4 [ 905.353418] R13: 00000000004bd892 R14: 00000000004cc568 R15: 0000000000000005 00:15:05 executing program 4: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00'}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:05 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:05 executing program 0 (fault-call:2 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:05 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext%\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 905.695174] FAULT_INJECTION: forcing a failure. [ 905.695174] name failslab, interval 1, probability 0, space 0, times 0 [ 905.706739] CPU: 1 PID: 4534 Comm: syz-executor0 Not tainted 4.20.0-rc1+ #109 [ 905.714023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 905.723383] Call Trace: [ 905.725995] dump_stack+0x244/0x39d [ 905.729633] ? dump_stack_print_info.cold.1+0x20/0x20 [ 905.734876] should_fail.cold.4+0xa/0x17 [ 905.738968] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 905.744095] ? find_held_lock+0x36/0x1c0 [ 905.748178] ? print_usage_bug+0xc0/0xc0 [ 905.752270] ? is_bpf_text_address+0xac/0x170 [ 905.756774] ? lock_downgrade+0x900/0x900 [ 905.760930] ? check_preemption_disabled+0x48/0x280 [ 905.765968] ? mark_held_locks+0x130/0x130 [ 905.770235] ? __lock_acquire+0x62f/0x4c20 [ 905.774488] ? is_bpf_text_address+0xd3/0x170 [ 905.778995] ? kernel_text_address+0x79/0xf0 [ 905.783424] __should_failslab+0x124/0x180 [ 905.787696] should_failslab+0x9/0x14 [ 905.791520] kmem_cache_alloc+0x47/0x730 [ 905.795617] skb_clone+0x1bb/0x500 [ 905.799201] ? skb_split+0x11e0/0x11e0 [ 905.803128] ? kmem_cache_alloc+0x12e/0x730 [ 905.807468] ? build_skb+0x77/0x270 [ 905.811116] ? bpf_prog_test_run_skb+0x289/0xcb0 [ 905.815881] ? bpf_prog_test_run+0x130/0x1a0 [ 905.820303] ? __x64_sys_bpf+0x3d8/0x520 [ 905.824379] ? do_syscall_64+0x1b9/0x820 [ 905.828455] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 905.833835] ? kernel_text_address+0x79/0xf0 [ 905.838262] ? __kernel_text_address+0xd/0x40 [ 905.842841] bpf_clone_redirect+0xb9/0x490 [ 905.847098] bpf_prog_759a992c578a3894+0xd0f/0x1000 [ 905.852128] ? bpf_test_run+0x175/0x780 [ 905.856120] ? lock_downgrade+0x900/0x900 [ 905.860283] ? ktime_get+0x332/0x400 [ 905.864060] ? pvclock_read_flags+0x160/0x160 [ 905.868571] ? bpf_test_run+0x175/0x780 [ 905.872567] ? trace_hardirqs_off_caller+0x310/0x310 [ 905.877704] ? lock_acquire+0x1ed/0x520 [ 905.881724] ? bpf_test_run+0x3cb/0x780 [ 905.885718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 905.891286] ? check_preemption_disabled+0x48/0x280 [ 905.896334] ? kasan_check_read+0x11/0x20 [ 905.900539] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 905.905835] ? rcu_softirq_qs+0x20/0x20 [ 905.909873] ? bpf_cgroup_storage_release+0x220/0x220 [ 905.915085] ? skb_try_coalesce+0x1b70/0x1b70 [ 905.919602] ? bpf_test_run+0x25d/0x780 [ 905.923597] ? netlink_diag_dump+0x2a0/0x2a0 [ 905.928020] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 905.933567] ? bpf_test_init.isra.10+0x70/0x100 [ 905.938266] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 905.943047] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 905.947904] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 905.953467] ? fput+0x130/0x1a0 [ 905.956763] ? __bpf_prog_get+0x9b/0x290 [ 905.960842] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 905.965707] ? bpf_prog_test_run+0x130/0x1a0 [ 905.970144] ? __x64_sys_bpf+0x3d8/0x520 [ 905.974225] ? bpf_prog_get+0x20/0x20 [ 905.978063] ? do_syscall_64+0x1b9/0x820 [ 905.982137] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 905.987521] ? syscall_return_slowpath+0x5e0/0x5e0 [ 905.992466] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 905.997328] ? trace_hardirqs_on_caller+0x310/0x310 [ 906.002365] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 906.007404] ? prepare_exit_to_usermode+0x291/0x3b0 [ 906.012455] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 906.017326] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 906.058358] protocol 0800 is buggy, dev ip6tnl0 [ 906.066605] protocol 0800 is buggy, dev ip6tnl0 00:15:06 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:06 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 906.245159] protocol 0800 is buggy, dev ip6tnl0 [ 906.250309] protocol 0800 is buggy, dev ip6tnl0 [ 906.255151] protocol 0800 is buggy, dev ip6tnl0 [ 906.260351] protocol 0800 is buggy, dev ip6tnl0 [ 906.266899] protocol 0800 is buggy, dev ip6tnl0 [ 906.314649] protocol 0800 is buggy, dev ip6tnl0 [ 906.372707] protocol 0800 is buggy, dev ip6tnl0 [ 906.409314] protocol 0800 is buggy, dev ip6tnl0 00:15:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:06 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext\a\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:06 executing program 0 (fault-call:2 fault-nth:4): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:06 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 906.655207] FAULT_INJECTION: forcing a failure. [ 906.655207] name failslab, interval 1, probability 0, space 0, times 0 [ 906.666685] CPU: 1 PID: 4593 Comm: syz-executor0 Not tainted 4.20.0-rc1+ #109 [ 906.674002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 906.683368] Call Trace: [ 906.685978] dump_stack+0x244/0x39d [ 906.689632] ? dump_stack_print_info.cold.1+0x20/0x20 [ 906.694861] ? check_preemption_disabled+0x48/0x280 [ 906.699901] ? zap_class+0x640/0x640 [ 906.703635] ? print_usage_bug+0xc0/0xc0 [ 906.707719] should_fail.cold.4+0xa/0x17 [ 906.711788] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 906.716897] ? zap_class+0x640/0x640 [ 906.720612] ? find_held_lock+0x36/0x1c0 [ 906.724706] ? is_bpf_text_address+0xac/0x170 [ 906.729216] ? find_held_lock+0x36/0x1c0 [ 906.733291] ? depot_save_stack+0x292/0x470 [ 906.737623] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 906.742727] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 906.747837] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 906.752433] ? trace_hardirqs_on+0xbd/0x310 [ 906.756755] ? kasan_check_read+0x11/0x20 [ 906.760909] ? trace_hardirqs_off_caller+0x310/0x310 [ 906.766023] ? unwind_get_return_address+0x61/0xa0 [ 906.770966] __should_failslab+0x124/0x180 [ 906.775219] should_failslab+0x9/0x14 [ 906.779022] kmem_cache_alloc_node_trace+0x5a/0x740 [ 906.784040] ? save_stack+0xa9/0xd0 [ 906.787679] ? save_stack+0x43/0xd0 [ 906.791341] __kmalloc_node_track_caller+0x3c/0x70 [ 906.796288] __kmalloc_reserve.isra.40+0x41/0xe0 [ 906.801071] pskb_expand_head+0x230/0x10f0 [ 906.805312] ? memcpy+0x45/0x50 [ 906.808595] ? __copy_skb_header+0x350/0x6b0 [ 906.813007] ? skb_release_data+0x880/0x880 [ 906.817343] ? __alloc_skb+0x770/0x770 [ 906.821242] ? __lock_is_held+0xb5/0x140 [ 906.825312] ? kasan_check_write+0x14/0x20 [ 906.829543] ? __skb_clone+0x6c7/0xa00 [ 906.833438] ? __copy_skb_header+0x6b0/0x6b0 [ 906.837849] ? kmem_cache_alloc+0x33a/0x730 [ 906.842182] skb_ensure_writable+0x3dd/0x640 [ 906.846595] ? skb_checksum_setup+0xaa0/0xaa0 [ 906.851092] ? kmem_cache_alloc+0x12e/0x730 [ 906.855413] ? build_skb+0x77/0x270 [ 906.859050] ? bpf_prog_test_run_skb+0x289/0xcb0 [ 906.863809] ? bpf_prog_test_run+0x130/0x1a0 [ 906.868221] ? __x64_sys_bpf+0x3d8/0x520 [ 906.872288] ? do_syscall_64+0x1b9/0x820 [ 906.876349] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 906.881724] ? kernel_text_address+0x79/0xf0 [ 906.886137] ? __kernel_text_address+0xd/0x40 [ 906.890645] bpf_clone_redirect+0x14a/0x490 [ 906.894991] bpf_prog_759a992c578a3894+0x5b0/0x1000 [ 906.900010] ? bpf_test_run+0x175/0x780 [ 906.903992] ? lock_downgrade+0x900/0x900 [ 906.908147] ? ktime_get+0x332/0x400 [ 906.911874] ? pvclock_read_flags+0x160/0x160 [ 906.916368] ? bpf_test_run+0x175/0x780 [ 906.920348] ? trace_hardirqs_off_caller+0x310/0x310 [ 906.925460] ? lock_acquire+0x1ed/0x520 [ 906.929443] ? bpf_test_run+0x3cb/0x780 [ 906.933448] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 906.939017] ? check_preemption_disabled+0x48/0x280 [ 906.944070] ? kasan_check_read+0x11/0x20 [ 906.948222] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 906.953514] ? rcu_softirq_qs+0x20/0x20 [ 906.957506] ? bpf_cgroup_storage_release+0x220/0x220 [ 906.962709] ? skb_try_coalesce+0x1b70/0x1b70 [ 906.967214] ? bpf_test_run+0x25d/0x780 [ 906.971204] ? netlink_diag_dump+0x2a0/0x2a0 [ 906.975623] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 906.981165] ? bpf_test_init.isra.10+0x70/0x100 [ 906.985840] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 906.990610] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 906.995459] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 907.000999] ? fput+0x130/0x1a0 [ 907.004287] ? __bpf_prog_get+0x9b/0x290 [ 907.008355] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 907.013202] ? bpf_prog_test_run+0x130/0x1a0 [ 907.017619] ? __x64_sys_bpf+0x3d8/0x520 [ 907.021689] ? bpf_prog_get+0x20/0x20 [ 907.025513] ? do_syscall_64+0x1b9/0x820 [ 907.029576] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 907.034946] ? syscall_return_slowpath+0x5e0/0x5e0 [ 907.039886] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 907.044740] ? trace_hardirqs_on_caller+0x310/0x310 [ 907.049761] ? prepare_exit_to_usermode+0x3b0/0x3b0 00:15:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 907.054789] ? prepare_exit_to_usermode+0x291/0x3b0 [ 907.059841] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 907.064704] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 00:15:07 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:07 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:07 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 907.348114] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:07 executing program 0 (fault-call:2 fault-nth:5): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:07 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:07 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 907.585258] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 [ 907.629042] FAULT_INJECTION: forcing a failure. [ 907.629042] name failslab, interval 1, probability 0, space 0, times 0 [ 907.640434] CPU: 0 PID: 4644 Comm: syz-executor0 Not tainted 4.20.0-rc1+ #109 [ 907.647763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 907.657124] Call Trace: [ 907.659731] dump_stack+0x244/0x39d [ 907.663382] ? dump_stack_print_info.cold.1+0x20/0x20 [ 907.668599] ? find_held_lock+0x36/0x1c0 [ 907.672708] should_fail.cold.4+0xa/0x17 [ 907.676797] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 907.681914] ? mark_held_locks+0x130/0x130 [ 907.686172] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 907.691121] ? kasan_check_read+0x11/0x20 [ 907.695313] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 907.700616] ? rcu_softirq_qs+0x20/0x20 [ 907.704611] ? print_usage_bug+0xc0/0xc0 [ 907.708708] ? __lock_acquire+0x62f/0x4c20 [ 907.712968] ? print_usage_bug+0xc0/0xc0 [ 907.717064] ? print_usage_bug+0xc0/0xc0 [ 907.721140] ? mark_held_locks+0x130/0x130 [ 907.725389] ? hrtimer_try_to_cancel+0x21c/0x6f0 [ 907.730169] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 907.734951] ? lockdep_hardirqs_on+0x296/0x5b0 [ 907.739578] __should_failslab+0x124/0x180 [ 907.743836] should_failslab+0x9/0x14 [ 907.747656] kmem_cache_alloc+0x47/0x730 [ 907.751764] skb_clone+0x1bb/0x500 [ 907.755325] ? skb_split+0x11e0/0x11e0 [ 907.759230] ? retint_kernel+0x2d/0x2d [ 907.763213] ? dev_queue_xmit_nit+0x379/0xc90 [ 907.767741] dev_queue_xmit_nit+0x48d/0xc90 [ 907.772104] ? __netdev_pick_tx+0xd30/0xd30 [ 907.776448] ? zap_class+0x640/0x640 [ 907.780181] ? find_held_lock+0x36/0x1c0 [ 907.784296] dev_hard_start_xmit+0x186/0xc80 [ 907.788737] ? dev_direct_xmit+0x6b0/0x6b0 [ 907.792991] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 907.798541] ? netif_skb_features+0x690/0xb70 [ 907.803092] ? validate_xmit_xfrm+0x1ef/0xda0 [ 907.807615] ? validate_xmit_skb+0x80c/0xf30 [ 907.812048] ? netif_skb_features+0xb70/0xb70 [ 907.816557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 907.822116] ? check_preemption_disabled+0x48/0x280 [ 907.827142] ? check_preemption_disabled+0x48/0x280 [ 907.832173] __dev_queue_xmit+0x2f71/0x3ad0 [ 907.836510] ? save_stack+0x43/0xd0 [ 907.840155] ? kasan_kmalloc+0xc7/0xe0 [ 907.844056] ? __kmalloc_node_track_caller+0x50/0x70 [ 907.849188] ? netdev_pick_tx+0x310/0x310 [ 907.853352] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 907.858463] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 907.863587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 907.863610] ? check_preemption_disabled+0x48/0x280 [ 907.863673] ? __lock_is_held+0xb5/0x140 [ 907.878282] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 907.883317] ? skb_release_data+0x1c4/0x880 [ 907.887662] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 907.892971] ? kasan_unpoison_shadow+0x35/0x50 [ 907.897572] ? skb_tx_error+0x2f0/0x2f0 [ 907.901568] ? __kmalloc_node_track_caller+0x50/0x70 [ 907.906699] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 907.912258] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 907.917816] ? kasan_check_write+0x14/0x20 [ 907.922056] ? pskb_expand_head+0x6b3/0x10f0 [ 907.926487] ? skb_release_data+0x880/0x880 [ 907.930811] ? __alloc_skb+0x770/0x770 [ 907.934722] ? kasan_check_write+0x14/0x20 [ 907.938963] ? __skb_clone+0x6c7/0xa00 [ 907.942855] ? __copy_skb_header+0x6b0/0x6b0 [ 907.947267] ? kmem_cache_alloc+0x33a/0x730 [ 907.951602] ? skb_ensure_writable+0x15e/0x640 [ 907.956201] dev_queue_xmit+0x17/0x20 [ 907.960007] ? dev_queue_xmit+0x17/0x20 [ 907.963985] __bpf_redirect+0x5cf/0xb20 [ 907.967972] bpf_clone_redirect+0x2f6/0x490 [ 907.972310] bpf_prog_759a992c578a3894+0xd4c/0x1000 [ 907.977328] ? bpf_test_run+0x175/0x780 [ 907.981325] ? lock_downgrade+0x900/0x900 [ 907.985474] ? ktime_get+0x332/0x400 [ 907.989205] ? pvclock_read_flags+0x160/0x160 [ 907.993700] ? bpf_test_run+0x175/0x780 [ 907.997691] ? trace_hardirqs_off_caller+0x310/0x310 [ 908.002806] ? lock_acquire+0x1ed/0x520 [ 908.006785] ? bpf_test_run+0x3cb/0x780 [ 908.010761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 908.016302] ? check_preemption_disabled+0x48/0x280 [ 908.021327] ? kasan_check_read+0x11/0x20 [ 908.025477] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 908.030754] ? rcu_softirq_qs+0x20/0x20 [ 908.034727] ? bpf_cgroup_storage_release+0x220/0x220 [ 908.039920] ? skb_try_coalesce+0x1b70/0x1b70 [ 908.044436] ? bpf_test_run+0x25d/0x780 [ 908.048429] ? netlink_diag_dump+0x2a0/0x2a0 [ 908.052849] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 908.058387] ? bpf_test_init.isra.10+0x70/0x100 [ 908.063066] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 908.067836] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 908.072691] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 908.078232] ? fput+0x130/0x1a0 [ 908.081513] ? __bpf_prog_get+0x9b/0x290 [ 908.085579] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 908.090424] ? bpf_prog_test_run+0x130/0x1a0 [ 908.094847] ? __x64_sys_bpf+0x3d8/0x520 [ 908.098919] ? bpf_prog_get+0x20/0x20 [ 908.102760] ? do_syscall_64+0x1b9/0x820 [ 908.106826] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 908.112194] ? syscall_return_slowpath+0x5e0/0x5e0 [ 908.117130] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 908.121978] ? trace_hardirqs_on_caller+0x310/0x310 00:15:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:07 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 908.126997] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 908.132019] ? prepare_exit_to_usermode+0x291/0x3b0 [ 908.137048] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 908.141922] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 00:15:08 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 908.208064] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:08 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)="6578743403", &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:08 executing program 0 (fault-call:2 fault-nth:6): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 908.519059] FAULT_INJECTION: forcing a failure. [ 908.519059] name failslab, interval 1, probability 0, space 0, times 0 [ 908.530532] CPU: 1 PID: 4688 Comm: syz-executor0 Not tainted 4.20.0-rc1+ #109 [ 908.537824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 908.547199] Call Trace: [ 908.549799] dump_stack+0x244/0x39d [ 908.553448] ? dump_stack_print_info.cold.1+0x20/0x20 [ 908.558650] ? __lock_is_held+0xb5/0x140 [ 908.562737] should_fail.cold.4+0xa/0x17 [ 908.566806] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 908.571915] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 908.577211] ? kasan_unpoison_shadow+0x35/0x50 [ 908.581800] ? skb_tx_error+0x2f0/0x2f0 [ 908.585783] ? __kmalloc_node_track_caller+0x50/0x70 [ 908.590894] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 908.596440] ? print_usage_bug+0xc0/0xc0 [ 908.600509] ? kasan_check_write+0x14/0x20 [ 908.604750] ? pskb_expand_head+0x6b3/0x10f0 [ 908.609183] ? __lock_acquire+0x62f/0x4c20 [ 908.613440] ? __lock_is_held+0xb5/0x140 [ 908.617506] __should_failslab+0x124/0x180 [ 908.621760] should_failslab+0x9/0x14 [ 908.625586] kmem_cache_alloc+0x47/0x730 [ 908.629677] skb_clone+0x1bb/0x500 [ 908.633221] ? skb_split+0x11e0/0x11e0 [ 908.637115] ? check_preemption_disabled+0x48/0x280 [ 908.642139] ? __this_cpu_preempt_check+0x1c/0x20 [ 908.646993] ? __bpf_redirect+0x54b/0xb20 [ 908.651180] bpf_clone_redirect+0xb9/0x490 [ 908.655464] bpf_prog_759a992c578a3894+0x11c/0x1000 [ 908.660496] ? bpf_test_run+0x175/0x780 [ 908.664474] ? lock_downgrade+0x900/0x900 [ 908.668627] ? ktime_get+0x332/0x400 [ 908.672353] ? find_held_lock+0x36/0x1c0 [ 908.676983] ? lock_acquire+0x1ed/0x520 [ 908.680987] ? bpf_test_run+0x3cb/0x780 [ 908.684965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 908.690504] ? check_preemption_disabled+0x48/0x280 [ 908.695523] ? kasan_check_read+0x11/0x20 [ 908.699680] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 908.704962] ? rcu_softirq_qs+0x20/0x20 [ 908.708937] ? bpf_cgroup_storage_release+0x220/0x220 [ 908.714129] ? skb_try_coalesce+0x1b70/0x1b70 [ 908.718660] ? bpf_test_run+0x25d/0x780 [ 908.722677] ? netlink_diag_dump+0x2a0/0x2a0 [ 908.727091] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 908.732630] ? bpf_test_init.isra.10+0x70/0x100 [ 908.737312] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 908.742081] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 908.746923] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 908.752476] ? fput+0x130/0x1a0 [ 908.755770] ? __bpf_prog_get+0x9b/0x290 [ 908.759841] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 908.764701] ? bpf_prog_test_run+0x130/0x1a0 [ 908.769115] ? __x64_sys_bpf+0x3d8/0x520 [ 908.773181] ? bpf_prog_get+0x20/0x20 [ 908.777007] ? do_syscall_64+0x1b9/0x820 [ 908.781068] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 908.786442] ? syscall_return_slowpath+0x5e0/0x5e0 [ 908.791373] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 908.796221] ? trace_hardirqs_on_caller+0x310/0x310 [ 908.801241] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 908.806262] ? prepare_exit_to_usermode+0x291/0x3b0 [ 908.811286] ? trace_hardirqs_off_thunk+0x1a/0x1c 00:15:08 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:08 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)="6578743406", &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 908.816139] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 00:15:08 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:09 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:09 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4h', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:09 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 909.602460] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 [ 909.724687] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:12 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x48) 00:15:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:12 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) [ 912.269833] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 912.320257] net_ratelimit: 506 callbacks suppressed [ 912.320268] protocol 0800 is buggy, dev ip6tnl0 [ 912.351373] protocol 0800 is buggy, dev ip6tnl0 [ 912.356318] protocol 0800 is buggy, dev ip6tnl0 00:15:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:12 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 912.384261] protocol 0800 is buggy, dev ip6tnl0 [ 912.430209] protocol 0800 is buggy, dev ip6tnl0 [ 912.491489] protocol 0800 is buggy, dev ip6tnl0 00:15:12 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 912.512945] protocol 0800 is buggy, dev ip6tnl0 [ 912.530350] protocol 0800 is buggy, dev ip6tnl0 [ 912.556356] protocol 0800 is buggy, dev ip6tnl0 00:15:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 912.579736] protocol 0800 is buggy, dev ip6tnl0 00:15:12 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 912.645910] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x200000e8) 00:15:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 912.723069] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:12 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4`', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b70600ffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:13 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x48) 00:15:13 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:13 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0x1000, 0x11, &(0x7f0000000380)="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", &(0x7f0000000040)=""/17, 0x3}, 0x28) 00:15:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 913.362111] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x200000e8) [ 913.490055] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:13 executing program 3: syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xfffffffffffffffb, 0x2101) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x838b) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xc, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7e9fffffeffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe0000000085000000000000b7000000000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0x3, 0x29, &(0x7f0000000000)="b90800", &(0x7f0000000100)=""/41, 0x7}, 0xffffff0a) 00:15:13 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 913.911037] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 914.029159] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:16 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x8000) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x8000}, &(0x7f00000014c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000001500)={0x2, 0xd, 0x0, 0x3c, r1}, &(0x7f0000001540)=0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000280)=ANY=[@ANYRES16=0x0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xffffffffffffffc1}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) fcntl$setstatus(r0, 0x4, 0x2800) syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0xa0, 0x102) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x62) getsockopt$inet_opts(r3, 0x0, 0x20000004, &(0x7f0000001600)=""/240, &(0x7f0000001700)=0xffffffffffffff37) 00:15:16 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x0, &(0x7f0000000100)=ANY=[], &(0x7f0000000140)="616c6c57dc0593aa7ec180882e657200"}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:16 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)="65787434ff", &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00'}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f00000003c0)=""/215) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000380)=0x2, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000080)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x67}, 0x28) 00:15:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000000000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000080)="b90700000064", &(0x7f0000000040)=""/41, 0x1}, 0xffffffffffffffac) 00:15:16 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x7, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x0, 0x0, 0x4e20}, 0x6e) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000080)={0x1, 0x3, {0x1, 0xfffffffffffffffe, 0x6, 0x3}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 916.691812] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 [ 916.815642] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:19 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:19 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000001f00)=""/41, 0x68}, 0x28) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo\x00') r3 = getuid() r4 = getpid() stat(&(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpid() lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000001c40), &(0x7f0000001c80)=0x0, &(0x7f0000001cc0)) r10 = getpid() fstat(r0, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001d80)=0x0) r14 = geteuid() r15 = getegid() sendmsg$netlink(r2, &(0x7f0000001ec0)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x8400000}, 0xc, &(0x7f0000000140)=[{&(0x7f0000000100)={0x10, 0x42, 0x10, 0x70bd28, 0x25dfdbfb}, 0x10}, {&(0x7f0000000380)={0xfc0, 0x16, 0x102, 0x70bd2c, 0x7, "", [@generic="fea0dabf14ccfcc3971e0c7152b15f136d10c0fdf690b99eddf386d83da46802137b4b570ced830303ca244ad54832fbc3afa3fc60fd1996cb2808cd3b26ae38974a61b2d41f7a963a30632da87a7a7eb2cafd2d64a48cbbf0bf8474e8036fda9cd55a722fc800c30299776dd40bc005b76130b8982d58031f299c7b7f28c1e30594fadded8945f369fb0799e798814ff6fe2a8a32d39d40389e87a09ec565a373fa8f402da6e167b32f3100a22fa72cf2f9b112b6f4216eea4cf6ce7700", @nested={0x188, 0x14, [@generic="bfcbbbabee5db6cbe12da0b97acdabd608e864d7923e57bf376f50840dbb57e7adde521908cdb2468b2781aba3ffd40cb2dee640b0d3ab192e6eed33ef6fe13dad", @generic="b87df9b9bd811efe4df3de8e31d1d948b87c85f8b45dc7feb34560aa05aa801f67c2c834687971216fc6e81cbde3fcac28defdf7263291db3f0ac057b03a0603829e8c29b76f573e21bd77679073b0946b556a33aa34cf8540a91f656f8105fd17c724dc982582088f1eb6398ab6703153b98daf671f67c20256553d1dcda5afa8d2e0160c90c47a584d0a9baf2eecf3ed8599678a6ce96d8a93ac6d66c6ab67a32e01a086f6e3c784d91777d27df22c2e912185adb689988dee3085f29c21ace3817a8f5b68734faf4569d1e7240b9d64b963c56ee97be88ed16ca96098ca6a1a43895fbb42f3e2d63e88bf11696860077e0abaf5", @typed={0x8, 0x93, @u32=0x4}, @generic="31b0326f3ba69786a2a0d50a541b0980cc81c6625d29382619b298d41806e55f6301c4c940e1241657272f3918f3aa24551802802da06303a42a36b65bea8675d9a66664"]}, @generic="1ab9b795b352409c2d047783233ae554957402c662f47ec27bf3a82a603edf8712ec48bfa9651adb9f28f0326f8b9221805ed48bb9644e7d3d52638065db99227d46ea09cb5ee0692b78be64e3f5ee883afedcd6666e6b386465b8d18df945846cf2daafafd6", @typed={0x8, 0x43, @ipv4=@local}, @nested={0x248, 0x10, [@generic="654eb7f1910d59216e1b4a6ec6870e8a3955fc94a2ae65d8800ba41eb3b062f0f81c4f86ce0a0b3000378fd0beb783eefb6f9ac43df1b8f0110c98073470046c07a8e79cad1c0d2817211237b77fdd5cbfd930e99ae756515e4bc3670ae7eaae6c3b412f0900400f7d892b126fc51dcfb485d28498c9d2f4aa413707ca39354cd6c4a58001ad16e28b6be6890704b4e3c6d956d452bf139cc7ad4d304bfa5aae2275d117187486674e4a7ede7a7776d8bba6dda69f", @typed={0x4, 0x70}, @generic="de645a80b3976145a46fe43fc06f9cf1d2b74cee8b6aeb0a219acffc85a16c5518aeaf7141bbd89fe398343d123618abf3eef8d7c677fa5a63fd7c00b4ca7e8166666071a5b77ae3afa31d27510e46cf2a27c61ec31c4edd939f4eb3ae499e3e5e93c573f92ab81b3bced965a6e2333c70d2dc68dabed15e3d79d2c3f373dbb5c336e33d3a2929b91dbaf59f36d6cc320eaa4ac40494b246db46cf0e8875526bce7b5dfbaf7dcbd055d42a55c9129b", @generic="d9e8a46f9ccf8060c2975b100d57da3c5d0a48b512852e27405103d74134f6bff5b2ab619c4b3565163514fc6bd862b472d101693accc6dc7584d3fb4f3f8d3800226284c4dada779d84e7bfcbb5e1b4eca6801a1653a35d1a1a3f429a7753099b10db9e1ed61e4ad648b042d6b6aa894dff41cc07180f981ef2376af602ca1a741166c07d53928bc2957cf1be2b973cada13de0529a82532fec8b47ecffdf3af119d5f334b83613238303eb30c4151530927ca4857955510332a89cd2d93c3b692ce165621c80f39f675eec669f2e4b818c3f5888a958359f"]}, @nested={0x55c, 0x3f, [@typed={0xe8, 0x26, @binary="26547dc59432cb1bc1d0149ccca32b24b8444f860119632e2dc04df179dc971ca7e3611069b9622620bd7ccf5c5b9902c648eb48f5127c2516f136cf27edb0f34f5c0ee107ea62e17aa7f53e461eafe3c12ac00036390b50247a3317b7b4ddfb904e0bc12b35d249e2a98efd6f097f889ea98bf524ad4b534c9f7a21c09a40f0b05adf74819ae2a3d3bae5232c1c0302ea5372369b308cc761c7320eef0a4fde7c691864f3f0e137f42c4d31a03b1b7b4ae904a4d40e6b2f97b31b66d123fff6cb633abba5b13639d8281a52e3f29fdc037c6104bcfc68afa614254e89d415f2ea88ec"}, @typed={0x8, 0x8d, @fd=r0}, @generic="5a8d262247033ab2eca6d535534a09bcb5f105752d98a55222508daa5abbd7970e4d1b9c88b081a9ae601fc84a164269824b09c3802bd27e69fc9ab3975b0fd38d79c0c9eb278ac0639a9040c3d0364fc6fc2b28831e3c3643d0e7d505fdbae302f9a7d3e59b9ca9bcc07704c7bc711ab23c87bbb0b404dba5f8a489e0c94f905c6927f4669bd1a1ca426b25598016d762da06963ed9bfd0", @typed={0x98, 0x69, @binary="20e3362ed938d01a382888dc649ec54437046a598d3d3cb7e2eb5a8f6cb4693ac778b5bb116bc9d2186007d05cffd5aa24ee25bfd3f4ce36a514bd764ad4fe4b9744cf0d5823fe630326c955878cc96145880380be3f321886f4ca17bd04fdfe136b660e97d0774aada45ca22f963ac85f2855d43440d5c2c09a36099cf0e31e4a21cd5d89357310ad46ec9cac237dad19"}, @typed={0x4, 0x3a}, @generic="36a5e68eeeff5d9c011284c2ae02d8fb4c0943b0341998390fcbfe1fc1f4ca850c53f290e9a5c5d99467cde1e0387fbf3b06b1b65e7ad15c44a7f3e02a5f01c389d513e2329cf3ea1d6578e6f773bd7a90adc8c1f25f4712c880f283dd1f4e22fca9baffd5c1b74207bad48b2bd1f550567c83c5b0d5ce771739e70c4a06249ffb7d43558ed3c054f36bbfe7eadd7876957099c29764a06839db98e8a579e8f4fa576f41715e4e168ed0e5046dd1294980e57ae7a2", @typed={0x100, 0x33, @binary="c36591d24f6547f04d2222d5d34680d569f0eef4a35a3be5021886c81fa78b333b0ed6cb57ed8850a6a7e5bf91016cd7ab88d0815ba685a48857034d23ef180e2839aa81dcdc0f244eed2686d9d2a3936b601e5febd3a3b48e4ea0891c1d3c28fb424f43f69cdaeece8c5ad5bbd5b3f93fb2a5f845b339337034503e64ef2e531c48eb875a64be9a99a65aea5d637569c444b5a7924c2f36a78179744b7370348765b83888258cef87d599b74149da4a77a61ae5f142a6a98d480575b88d2578c836f2192c82714dd33fd3ab02bf868ee04faf821ffb87784935bdbb4f4354056cdd30423b8cdad0c6c1baf26f4b7f807f32d3173fc3e43e1a"}, @generic="5aebdd20bb69641ca8c0db97587f5307e28d526e3dfb6afb2bdda284a7300d7c653ffbea103168a4afb5c505b71b798d987ca661dd5ffdfc8a2be156874bbba236dbd66b2243cd9f8eb3c984078b7ecca3aa7ce26f6dc2ae019a1b423cd4e1f19d96d7a0917ecc846e82a41bfe3bf2fc2c4cb477f15a6ba5182bdcb0b18f2790de58c596188ad47256cee8ad431e7b3cdb1013ab0135752183596522ec0a8d420504222a9f6a2b439691a9cc38", @typed={0xc, 0x65, @u64=0x1}, @generic="ff53d4b87835135f57ca98abce9708803ef415e755f00de4b3cfe8a877a753cd917b33b4d561c04a17b66392b4bbef7195afada4b2c301cf9619a5f2349ad4ec9947b43dcf8f99a27c28edd3ed017a2646d50fb1d82ce12e7738ec2acc7e8f53ae92676051e9b2f16abb3ebf8aff9ef77812eff46742b7727f80ca2a3b14552d3e92b4623312659a5b35cf3e6de979f7e55831bf1008051fec07bdb44255f110af8792a6804ba43f4700401213498b69645eaab5371d6c419180736fdeaa68a634840312a3"]}, @nested={0x4e4, 0x73, [@generic="57964fb9924b2f711fe80c2f18dc737105466b9e2cf31f3be5abb651fe937db41013906715a9978d8bbdca16163a45371ad84322595f7647aecfd4a00446918c5259298f8d2c2f5311fcc3dd5e08ca79b48e3379d68344292c9f57420d3641ec74eb6590184bca858fcd5df6dee4f296f30f24f91822f789354e522e18c08a5cc132", @generic="a9d91149970dde1693ab086e4c4ac73efea4aa64695119ac3dcb6292823d691fd8789341193d5ebb1177e82c36cd3e38bc47244fb0c305b716e41beff98423adb292e4cd2f4d0e01512894320b058babed28c189512465751ded4a8f038f7534d2bae13bb1fb6cf0b6ce329972db10f433087c72f9242224a4af1fc2ad129b8e491a5d4e83c4", @typed={0x8, 0x52, @ipv4}, @generic="51b4ec879ae3e2607afd83120e48a8d58ea8a75ab8ec1ad6ba89f2042dfeec49290c57423899bb5544720dd5706f0ed668a21975eccce1f7421b7aea08e853c347dee66e19ac47b60d9730cb0e8ae92f455ea2c1da9c72592df6022e6a943a766aefba10f48788b02b50fa4c4747648e771adeb6bed0d6868aaf95ea772b9a0930dbe143dc761f14e9fc8433a0b84ce358794c12c9c0ff0b5cddc53613cbe0239049a4acf11aaa830d97dada8002398cdd3df5a3f7a08b", @generic="a33654b247550f0cbb033a107c776f6941bddeb78c1ba0f9767bf0e305709cdcf663e15fe6c4249c7a70856b8ead474589664352aca687fd3c2460367ad2eeb2760f45adf4e476931dc1319b676cdb5bffd14a8d9a87a45971a1c9f0d5f210018f2a", @generic="e81c8fe9ba6d0277843a1834a73c4b6b2ddba97fc621e3016289c9751f7829eefd5d30c8dd078c48634ed96b337c5317c4e22fea1587f620b8bb5302cef702a92414f114f4c06e1a276a40866943132cc70128b9d0272ecdbfca04941da6a7beab3c47ee7fbb056163d9e4d92578a35aed1b2c9ebfa2e44098c97730fd0a24fc750ff8d08f20ff02eb804842564e5e9666b35da69b8bd60d40771dbcd3f2a2f9c2c12b9023bbb82ae7c4af6199bdfe8c589ea61a9a1acebc84e6bbb409fcdc5c37800a4a90272eaf68031e196083bad779053edad82b97e376da7d13c89eff9ad1f638c042dc761b95c1e7379a", @generic="d8b2a6e02cc382c3fb9ee7618a7d37b65b11f57dd717e7de1f821390055e6514cf23ce8b55aa23d0aa1dadf4449c7053e8a0d5cea2ebc692202436dc11aec243", @generic="f47acb7c834c316012f0c8e50b6979cfb785f869569ab63e661017a0d738cdbc4bcde0da44d4b05c45b368305d55d3596bf269e2841232d8d9048cb47e264d56bddb4b9cfca47f53cee10dcc66a2cb019bb86cea9a4d2ff9433f88f35442d3b2b9ab2b93592fe28276adea88d500556d6d9b23138638917169041b573171dca0e24ef4913eb597599ad8c55707bd3480eaf61039e2a5816aef55c148bfb4b0cd1c1451263a0c45c9542d2b63dd67c3aaeacbf2d61bf10eb45893cad88b770febdbb8e3677998f8651e8b4d044e4fe46da91a3d3ffa3365e0a53f420953575587", @typed={0x14, 0x69, @str='vboxnet1+bdev\x00'}, @generic="4916dbe5ddf92ed9659880d39b4521bea2a6b9df6aa2251533e85fa830325c7e636dafc3eb718176ce5c679c4568f96a0488f4c7b676b9cf585e7fede40381ffd35e39ff531f8cd56b440ddba8f8522d7ab1db561633c56894ff4b7dea874b34259049d1b61622ae8ca355a132c73a4132186834e8a67a1946bac37068ecbac11750d7290f3e95c9f0d3513c258e0fabd9026eb9cb1f"]}, @generic="f51899707f137b204523ead3408cda50d2ab1db168f979bebdcfad815d3c145312ba54881fa38cc1c991c46a4576a1ff17920eca884b36c39b4ca39f0f96700e4f3d4859fedb8ad95dedf6fe07c3e9f9c4e1ee1ae9", @typed={0x8, 0x9, @fd=r0}, @generic="dafa2b3bbf2f7746766aa8a4afab95036eb236301a"]}, 0xfc0}, {&(0x7f0000001340)={0x360, 0x37, 0x0, 0x70bd25, 0x25dfdbff, "", [@nested={0xcc, 0x70, [@typed={0x8, 0xa, @uid=r3}, @typed={0x58, 0x6e, @binary="688b6944b8b9a71471c7fdbc4a90ff41ebe031ac8fdb4f313f8e0a18883b0f8c052759940842dfda186ae62580b586545d1a6a1fb51c54ea1f6c24309402a8774d030629162a1ac32aff50c476a66b3950f9"}, @generic="518cdfe2c21124858cac77759e01a560f0f0edcd009181662c88cf6d83f43ccb360a2c61c21ffe3205688a2838a80378cea4a2673578ed86ed0328afc3e797e231c4329297916ee0f517fdcc9e454cdd6fabeadc54f1a27db468bfd776ca24ed43055e09a382da61"]}, @generic="c395be60ee96398bc2a829f8ef5f033d1e8df4bf86968207694e60c609dad4a5a30c9466eb49fdb9e88d140616af7ea4c0cee959f29faf0c88b83f4a0163cc59", @generic="234018bee9072da1db08fcce70ebe95f058ad97749bb2aa6675e70a632294a8861dfec5ab29eef52f5890ab1dde96cc39efd01ade4630c329d9b3984dfb3dd074e23371c2849586c775021d813bc5bdfae2168579575065666f83b0eff399b775ef3b486b2702b94c73ba83a391acb3f346d9a31230636357a28e045cf8931f45d2886f8217c39eb2f3dc7cf595d7975cd92877a7da5d6ee430c2341591dc85d5716f6ade478b58165ae6dcf68cf78bcf7b4d7e96aa8ac0172ffbac8bcd292ca534490cfc7289a68ec20d7b3685756a488e93acdfd260f4cc80885d0118d5bd54ebe62205c6456445ececdc4ce6984fbaf50", @generic="fabdeeb41eaf4ce8281c67ff33edcaeaccb82f85c06b0c71095a4ef592f34fef04154148fbdda1c36c4551693a8cf476c5148a67fec4197f61b091921c8f818f711d9492b8117206cbc9e7f1e9c5602db710cf84a9bd1624e13009e976c4286ee44766396c5b74409f269f9767c87dc85c73c3a1f6f77cfadf6a48063a42e5c6417a431d034a354060735f47764c754a8dec5bb52fae35a3e9f351aa7a", @generic="8ea1698031e53f1c5d64a28bf7ad4ba57df59a64ea775d", @nested={0x8c, 0x67, [@typed={0x8, 0x92, @ipv4=@broadcast}, @generic="1ce8a5c4b66b392e689e8889363fc7ce96894ebd318a47999bf18961db", @generic="1c578ddc35329efcd2b60bae80d574f2b87f8295b3f3f6c42554e5ca906cafd0d91efc7742f1eb5f6c68876e245ef2415442384bd48e4e93919729acd007c7ba3c8ccb7e11972d0d30a8fe1bbf506005d800bd935dc525db9441", @typed={0x8, 0x24, @fd=r1}]}, @typed={0x4, 0x25}, @typed={0x8, 0x2, @ipv4=@remote}, @nested={0x4, 0x65}]}, 0x360}, {&(0x7f00000016c0)={0x36c, 0x13, 0x0, 0x70bd25, 0x25dfdbfe, "", [@nested={0x24, 0x2f, [@generic="ad24125d492430d957c08af7efb48ee980f14274e196a6ba6ffa18baa109"]}, @nested={0x2f0, 0x51, [@generic="d45b93a0f977972ecaf1267a305545ba3b5015af2c94ff1046058ab719c9caeda0b35648e45713673325f71c8170396a7676d662c0e3bf5415cdeca4d20b810b21e209f6f865cc4832cc08ae2d670d68755b7393234e990828a685b007661feef25e5f26314341b6294685e51200746ff63bb3694b920426ab50a47659c9a521e4f615b67810a91a26aec33a211af8b40984a96106a1d34186a4680b41b743270b3941598e1edf503cb455c6", @typed={0x14, 0x47, @ipv6=@ipv4={[], [], @remote}}, @typed={0x8, 0x4f, @ipv4}, @typed={0x14, 0xf, @ipv6}, @generic="d74d7e6ad9e52b1c8a56d7fae8b6752366a14a2528df9abbf3e79415fc22a951e8e9264533b405d96f1989dab83809058b01d63485161549982217d47a8d71189f336f75528b1cf4560276d12b6960f797bffe58535f", @generic="73708d7cd62d6456b74955e3057e874107b8dd9f758d99ffdbd3f6a8bba2dd4023f7a1c599ef778976a685cc81548ab85e7cf776ac84bc0e96427c4cce7869546b25458e2b75bed2591c5afce7b068820884c0cfd4a2438bbb08912c3dcb27320481c8a831538efb441db7ac2165f8e51e0dde2e46cfd40eee792fd88f2c970e831260c3648383a82f8777a2c9c8b27dd19191f78e122f11ed35a61445e8c5eee8da6855b1bc63bce0530f771d68964e98aa5368234ac31bfc2813acad4fe8a8806e55d503ffdf40ecc5f5675e95ce90a8096ea694f49337df44f72da9cbcbb6436cd4dceee63aa21125456ac0e27472964d414559", @typed={0xc4, 0x3c, @binary="ce9dc5bf5ee4ad2a2fcc80088803191a85ced7a00706bb174141449793670732492dbe361c4708f9f38e97b1b49e557d36bb9515dcb0235dd23925c6f8ebb9834fa272a602c9774ae7572b786278799a70b0fca8f540ab720d72a3e03fc3d0b62d7cdc5145dcad0132dff4ed208b7b48d26d6d7a3dd5991c2627ada486314017ea168d5baedd3d8349ecc3fcddc69f37299810cacba2719b8de69ed40c0a68a7181777098e869f0828e90f5fd7edec9a397edeae7a6284a1d669c5ef2d11"}]}, @generic="6d8d893e42772581d274b34e22292f25d66016bb42074c26064ff67d741ecd5d5e35011893354c5c5f332391eceae10d52112e12997f80e1439140bf1a1aedfeb3f7abb077f88b"]}, 0x36c}], 0x4, &(0x7f0000001dc0)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r10, @ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYBLOB="0000000028000000000180000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0xd8, 0x1}, 0x80) 00:15:19 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x800, 0x0) r1 = getpid() getpgid(r1) r2 = getpgid(0xffffffffffffffff) write$cgroup_pid(r0, &(0x7f0000000080)=r2, 0x12) syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x0, 0x80) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) [ 919.226782] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 [ 919.238617] net_ratelimit: 925 callbacks suppressed [ 919.238626] protocol 0800 is buggy, dev ip6tnl0 [ 919.280775] protocol 0800 is buggy, dev ip6tnl0 [ 919.286249] protocol 0800 is buggy, dev ip6tnl0 [ 919.294131] protocol 0800 is buggy, dev ip6tnl0 [ 919.300852] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 [ 919.304508] protocol 0800 is buggy, dev ip6tnl0 [ 919.313613] protocol 0800 is buggy, dev ip6tnl0 [ 919.319879] protocol 0800 is buggy, dev ip6tnl0 [ 919.341000] protocol 0800 is buggy, dev ip6tnl0 [ 919.351474] protocol 0800 is buggy, dev ip6tnl0 [ 919.356834] protocol 0800 is buggy, dev ip6tnl0 00:15:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x68, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:19 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 919.563697] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:19 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x2, 0x80000001, 0xbb84, 0x8, 0x0, 0xb8a, 0x1000, 0x0, 0x100000001, 0x7fff, 0x5, 0x5a7d, 0x4, 0x57f4, 0x8001, 0x4b, 0x2, 0x5, 0x1, 0x1f, 0x401, 0x8001, 0x0, 0xffff, 0x0, 0x5, 0x2, 0xffffffff, 0x7f, 0x0, 0x2, 0x9, 0x9, 0x2f98, 0x4fca, 0x2, 0x0, 0x56e7, 0x2, @perf_config_ext={0x2, 0x2}, 0x20000, 0x2, 0x7, 0x9, 0x6, 0x1f, 0x9}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0xb) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x200, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, r0, 0x0, 0xa, &(0x7f0000000140)='syzkaller\x00', 0xffffffffffffffff}, 0x30) mq_notify(r1, &(0x7f00000003c0)={0x0, 0x33, 0x0, @tid=r2}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000400)={0x1000, 0x10000}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:19 executing program 2: socketpair(0xa, 0x3, 0xffffffffffffffc6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000080)={0xffffffffffffffc0, "31f1555961a04a5ca53b8fe93be39963728fc3c9cf17a8fb46b05e54ed48312a", 0x2, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 919.628266] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:19 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 919.856095] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 [ 919.943744] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:22 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x9, 0xf4e1e20343082bc0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000380)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:22 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:22 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)="65787434fb", &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="b702000009000000bfa30000000000010703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffd4a0e32b6f622d330000650404f6000000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) socketpair$inet6(0xa, 0xa, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002a00)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000002a40)={@mcast1, 0x25, r2}) 00:15:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000009000000bfa30029624e00000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7130000000000006a0a00fe00000000850000000d000000b70000000000000095000000008f61379ddc9ecbedf5f1ebb18229853f11968cb7cc121ae343772d036ecbc3d7e6639c4b80ffc4de040f89bbb7c2a343f2c9925e117d11108a9a0d39c65c0faa3a35574a3c089263f310c8a63e8e44c989b26ea2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x12a00, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000140), 0x4) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@int=0x10000, 0x4) 00:15:22 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000009000000bfa300000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650a723eca5a269844d84e05d79a882a040400010000000404000001007d60b7030040000000006a0a00fe00000000850000000d000000b70000000000000095000000000000009867d043350029b9a2cecd89cbd1116b8e8111271cb655cc321c55055274d7aefbc7643ef1bfec64c9b471cf55f9e08194a01e80c9b6c065e0e00fca74c57a2f3e6e96484b2faad8496336cea94f9d728fb0e3f407a5aa53ee3748c4909b2cd86664ee1205fa3fe0c621d1755eb61e3d00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x1015, 0x3, 0x8, "efc778e8a32d5e2ac3d3e4fab1e7d04f", "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"}, 0x1015, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f00000014c0)={0x0, 0x8b, "4cbf7d6f46fa284cee368a9f417f27e37f5a199a8d6f11972049e99624b897cb6bef999e6aa3674239b8ddaf93c94feca2f82b7884e3aafe33702b5d0cc4041db92c0af81559311ba60295fd19aa983064ff0b12c78e1039eccf9ec25c19ad15c0fc2aa7f03613a8578f7c8ceef97c37c4386d047cee2fc2319bb4ecbfa53c4f1bbff2449f23b443b495b3"}, &(0x7f0000000140)=0x93) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000280)={r3, 0x1000, 0x9, 0x100000000}, 0x10) 00:15:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 922.714728] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 [ 922.829408] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:22 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 922.983403] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 [ 923.086146] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:25 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:25 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0, 0x0) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000100)={0xb52e, "83fa32cff01584e7f1f5f3126ee4e8c5e2e65ec7a575962170d8513bae34b607", 0xa00, 0x400, 0x1, 0x4, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffa4f0ff00000000b706ffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000380)=""/171) 00:15:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000380)={0x952, 0x0, 0xd, 0x0, 0x0, [], [], [], 0xffff, 0xb07}) 00:15:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:25 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) [ 925.442277] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 [ 925.467176] net_ratelimit: 822 callbacks suppressed [ 925.467185] protocol 0800 is buggy, dev ip6tnl0 00:15:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$intptr(0x8, 0x1ff) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000040), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x1800000000000006, 0xffffffffffffffe0, 0xfffffffffffffc58, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 925.496581] protocol 0800 is buggy, dev ip6tnl0 [ 925.505387] protocol 0800 is buggy, dev ip6tnl0 [ 925.523103] protocol 0800 is buggy, dev ip6tnl0 [ 925.529274] protocol 0800 is buggy, dev ip6tnl0 [ 925.575020] protocol 0800 is buggy, dev ip6tnl0 00:15:25 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)="65787434ff", &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 925.603122] protocol 0800 is buggy, dev ip6tnl0 [ 925.624658] protocol 0800 is buggy, dev ip6tnl0 [ 925.671391] protocol 0800 is buggy, dev ip6tnl0 [ 925.689143] protocol 0800 is buggy, dev ip6tnl0 00:15:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0ffe9ffdfff79a4f0ff00000000b7060000ffffffff2d64050000000000650404b7030000000000006a0a004c00000000850000000d000000b70000000000000095140000000000008f3cf4749fc9f58ffca26e04bd29d7f978bbd28ddc96d90c5baf2375af7b135023250ea915763d5de22d4db3531736c071075851ede53a7b96f3e91fae1bee119754ba7198af108897253ca38299f58944b0db6c34fd0a46b3f0ab951179ccfe7cde5786fb437deff45a4ef6d7b8c8d3c78030a23b45d770e62c4e418e0071cf99aa3fd909b033a10a53562ffd8000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xfffffffffffffffd, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000540)={@multicast1, @local, 0x0}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001b00)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000001c00)=0xe8) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000600), &(0x7f0000000680)=0x68) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001c80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001cc0)={0x0, @remote, @broadcast}, &(0x7f0000001d00)=0xc) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000700), &(0x7f0000000740)=0x4) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000006c0)={0x18}, 0x18) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000001d40)={@dev, 0x0}, &(0x7f0000001d80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001dc0)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001ec0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0}, &(0x7f0000002040)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000002080)={0x0, @dev, @multicast2}, &(0x7f00000020c0)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000002100)={0x0, @broadcast, @multicast2}, &(0x7f0000002140)=0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000005c0)=0xa4, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000002180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000021c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002200)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000002300)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000002340)={@rand_addr, @dev, 0x0}, &(0x7f0000002380)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000002b00)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002ac0)={&(0x7f00000023c0)={0x6dc, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x1f4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffff}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r7}, {0x248, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x3, 0x0, 0x3f, 0x7}, {0x9, 0x8, 0x26, 0x4}, {0x8, 0x2a9, 0x7, 0x3}, {0xed2, 0x4, 0x9, 0x7ff}, {0x8, 0x3ff, 0x3, 0x6}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r11}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}]}}, {{0x8, 0x1, r13}, {0x7c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0xb8, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r17}, {0xe4, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x6dc}, 0x1, 0x0, 0x0, 0x40001}, 0x41) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000068, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:25 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)="65787434c0", &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:28 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:28 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in6={{0xa, 0x4e21, 0x7fff, @empty, 0x6}}, 0x1e, 0x1, 0x713, 0x1000, 0x92}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000580)={r2, 0xff, 0x100000000, 0x8001}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa33548656456310926873b0000000000000703000000fefff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000000400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0xa}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x1b) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000480)=0x1c) 00:15:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x68, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x3, 0x101000) setsockopt(r1, 0x6, 0x8, &(0x7f0000000380)="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", 0x1000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000040)=""/41, 0x68}, 0x36e) 00:15:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:28 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)="657874340e", &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rfkill\x00', 0x600000, 0x0) ioctl$VT_ACTIVATE(r1, 0x5606, 0xab40000000000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000040)={{0xd8, 0x9}, "706f72743100000000000000e40c7ab5c11237f6002400fcffffffffffffdf1800000000ff0100000000000000000000000000b100001700", 0x20, 0x400, 0xfffffffffffffff7, 0x3, 0xa7, 0x800000040, 0xec8f, 0x0, 0x4, 0x2}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/netlink\x00') ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000540)={{0x20, 0x7}, {0x0, 0x20}, 0x6, 0x2, 0x2}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000004c0)={0x2, 0x8, 0x80000001}) mlockall(0xfc) unshare(0x40000000) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r3, 0x0, 0xd, &(0x7f0000000240)=""/85, &(0x7f0000000140)=0x55) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r2, 0xc008551b, &(0x7f0000000500)=ANY=[@ANYBLOB="030000002500000000000000"]) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{0x9}, 'port0\x00', 0x0, 0x50, 0x6, 0x10000, 0x1, 0x0, 0x101}) prctl$getname(0x10, &(0x7f00000003c0)=""/252) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$sock_inet_SIOCGARP(r4, 0x8954, &(0x7f0000000340)={{0x2, 0x4e24, @multicast2}, {0x1, @local}, 0x20, {0x2, 0x4e23, @multicast2}, 'veth0_to_bond\x00'}) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000002c0)={0x0, 0x15, 0x1, r4}) getpgid(0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:28 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)="6578743404", &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:28 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa300000000000007032000000000000000f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) ftruncate(r0, 0x4) [ 928.715905] sched: DL replenish lagged too much [ 928.788174] IPVS: ftp: loaded support on port[0] = 21 00:15:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xd, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:28 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x5, 0x4000) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0xa, &(0x7f0000000100)=[{0x7fff8, 0x5, 0x5, 0x3}, {0x4, 0x0, 0x7fffffff, 0x51}, {0x3, 0x71c2, 0x7ff8000000000, 0x7}, {0x42, 0xfffffffffffffff9, 0x18f, 0x6}, {0xffffffff, 0x6, 0xfffffffffffffffd, 0xad04}, {0x8, 0xa93, 0x628, 0x401}, {0x5d0, 0x9, 0x3ff, 0xf6}, {0x8, 0x8, 0x0, 0xffffffffffffff00}, {0x2, 0x0, 0x1, 0x2}, {0x2, 0x8, 0x9, 0x4}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x6, 0x82002) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x7, &(0x7f00000003c0)=0x0) io_cancel(r2, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x7, 0x2, r0, &(0x7f0000000400)="4d19e7dd1095e9cc48c086e2462750e2c258d5df496fe7c37e5499f95e499a0a2d5eb10a05af5b06e9af486e392354c896d5e96ec88e68d3dec75535d9e88c9fd0345a0f67fc97d040d1f12af10a72199c0b13ac35c6fcd42370df955716cff85787c3f9aa5ef03e6e8aa51c10b99a2050f6275573f88adbe15a55804588b9d6fcb8c81dd6c35a347e2f3f92c6bde99752cb3544b90acfe6441c46b152eff8fd14a6c5f7a206bc2df3679b6b6d8962d90d3b3f77f61a5e32f86c63a790e8cccc1cef0403c9d19aa849438185b736753ea4a5dfa322e4aef7", 0xd8, 0x100000000, 0x0, 0x3, r1}, &(0x7f0000000540)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:29 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 929.115945] IPVS: ftp: loaded support on port[0] = 21 [ 929.200936] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 [ 929.267482] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:31 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)="65787434ff", &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe80, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:31 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:31 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f00000003c0)="b90703e69ebf08bb64879e100800", &(0x7f0000000000)=""/41, 0x68}, 0x28) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x3, 0xffffffff, 0xfff, 0x1, 0x0, 0x1, 0x800, 0x2, 0x1, 0x100000001, 0x8, 0x9, 0x80, 0x80000000, 0x5, 0x3ff, 0x2000000005, 0x122, 0x1, 0x0, 0xa000, 0x1, 0x10080000001, 0x800, 0x9, 0x400, 0x4, 0x2, 0x5, 0x81, 0x100000000, 0x40000008, 0xca4, 0x5b9, 0x7ff, 0xfffffffffffffc01, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x8}, 0x2000, 0x8f7, 0xa00000, 0xf, 0xfff, 0x7, 0x401}, r2, 0x10, r0, 0xb) 00:15:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0b7060000090000006032155f0800000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000f23700000000000000000000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x8, 0x200) write$P9_RREADDIR(r1, &(0x7f0000000380)={0xfd, 0x29, 0x1, {0xfffffffffffff800, [{{0x8, 0x2, 0x8}, 0x100, 0x10001, 0x7, './file0'}, {{0x29, 0x4, 0x5}, 0x2, 0xff, 0x7, './file0'}, {{0x10, 0x2, 0x2}, 0x5, 0x7f, 0x7, './file0'}, {{0x4, 0x2, 0x4}, 0x10001, 0x0, 0x7, './file0'}, {{0x0, 0x4, 0x8}, 0x7, 0x80, 0x1, '.'}, {{0x10, 0x2, 0x8}, 0x9, 0x2, 0x7, './file0'}, {{0x48, 0x3, 0x8}, 0x100000001, 0xff, 0x7, './file0'}, {{0xc0, 0x2, 0x4}, 0x3, 0x2, 0x7, './file0'}]}}, 0xfd) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 931.609873] net_ratelimit: 822 callbacks suppressed [ 931.610187] protocol 0800 is buggy, dev ip6tnl0 00:15:31 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001440)={r0, 0x0, 0xb1, 0x1000, &(0x7f0000000380)="5fe2b27ce82134eac35bb94131f098cf50c82fe7d44a679216cd19e516be00658041d6cd07907fc2730d52d771f5ab128d5c5d5ac5fc6cd4444aee1fce177819d14973ce83a35c1dc1b3834837219cffd8b8166ce55d67f37966ffa6e20981996c4035b344d495060cca678fd6d12f74757c03436866733343792a34c1462bb27bdb6e43700cd68793b69e77503641327c62ff5b0e08fede29deb161f6e18b9fc4636197705092db30ba5099755b103899", &(0x7f0000000440)=""/4096, 0x6}, 0x28) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r3, r1, 0x0, 0xa, &(0x7f0000000080)='syzkaller\x00', 0xffffffffffffffff}, 0x30) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000001480)='trusted.overlay.nlink\x00', &(0x7f00000014c0)={'L+', 0x80}, 0x28, 0x1) [ 931.666183] protocol 0800 is buggy, dev ip6tnl0 [ 931.672191] protocol 0800 is buggy, dev ip6tnl0 [ 931.679193] protocol 0800 is buggy, dev ip6tnl0 [ 931.685100] protocol 0800 is buggy, dev ip6tnl0 [ 931.692531] protocol 0800 is buggy, dev ip6tnl0 [ 931.695685] protocol 0800 is buggy, dev ip6tnl0 [ 931.735470] protocol 0800 is buggy, dev ip6tnl0 00:15:31 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 931.757715] protocol 0800 is buggy, dev ip6tnl0 [ 931.761623] protocol 0800 is buggy, dev ip6tnl0 00:15:31 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:31 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x220c00, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000100)={0x2, 0x20, 0x5}) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 931.944015] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xfffffffffffffe54, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000100)=""/41, 0xffff}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x80, 0x98, 0x2, {"d90cb854d62629262bd16662d3fdc7a102b1c37f31128f0d2237101acf656b725161a161c73754510d626fb2cb2b07765740fd8983080419afbb51c2cf8b78d01e7e90905dc6f35113c6586d0424dadd4d561b4f6cb5fdffcf0bba59b302be0f9c5c4dec911e382cadec02d412042664523b423d8006f8f3ec4d29af2b7b"}}, {0x0, "34259905259333cc328dc41ee1940ecd656c1aa04285b62bce7d9d9a"}}, &(0x7f0000000040)=""/14, 0xb6, 0xe}, 0x20) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x18042, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000005c0)=0x6ec) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x40, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x9, 0x13, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0xf, 0x1, 0x0, r1}, @exit, @ldst={0x3, 0x3, 0x3, 0x1, 0x4, 0x26, 0xfffffffffffffff0}, @map={0x18, 0x1, 0x1, 0x0, r2}, @jmp={0x5, 0x7, 0x5, 0x8, 0x7, 0x98, 0xfffffffffffffff0}, @ldst={0x3, 0x2, 0x1, 0xf, 0xa, 0xffffffffffffffe4, 0x4}, @alu={0x0, 0x3, 0x4, 0x4, 0x7, 0xffffffffffffffff, 0xfffffffffffffff0}, @exit]}, &(0x7f0000000500)='syzkaller\x00', 0xdb7, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xd}, 0x48) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000600)={0x1, 0x1, [@dev={[], 0x17}]}) 00:15:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x2000000e, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 932.058026] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:32 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000dc0)=@security={'security\x00', 0xe, 0x4, 0x438, 0x0, 0x0, 0xf8, 0x2e0, 0xf8, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x4, &(0x7f0000000080), {[{{@ip={@dev={0xac, 0x14, 0x14, 0x19}, @empty, 0xff, 0xff000000, 'veth0\x00', 'ifb0\x00', {}, {0xff}, 0xb7, 0x3, 0x16}, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast, 0x100000001, 0xc, [0x19, 0x8, 0x27, 0x3a, 0x1e, 0x2c, 0x12, 0x27, 0x13, 0x27, 0x38, 0x10, 0x7, 0x17, 0x35, 0x7], 0x1, 0x7ff, 0x7f}}}, {{@uncond, 0x0, 0xc0, 0x1e8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xe, 0x8}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x3, 'system_u:object_r:xen_device_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xc0}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x7, 0xa45}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000380)=""/182) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2000000000000152, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x33) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:32 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)="65787434f5", &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a80)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000002b80)=0xe8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x68, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x731c, 0x48800) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xc85}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={r1, 0x10000, 0x6, [0xfff, 0xdc, 0x32, 0x1f, 0x3, 0x4f]}, &(0x7f0000000380)=0x14) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:32 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\a', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b96803e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:34 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x40000, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000140)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x68, 0xf6, &(0x7f0000000380)="f5ae9ca4d2d4835a358377cb46c47ea5a19a4ad1174211404c12fb158b430f51052792ff88bdc75e02dafc6e3c3a1d5e2bd1dac02c51e5a0d8cc5497763d52a2d72dd8ab151abde3f68dcd6d885a6f707301092293f1594055cbbfe5728a9bf37e3f9864dca415aa", &(0x7f0000000400)=""/246, 0x101}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) init_module(&(0x7f0000000040)='\x00', 0x1, &(0x7f0000000080)='self\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0xffffffffffffff02) 00:15:34 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:34 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='net/ip_tables_names\x00', 0x1) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000140)={0x3, 0xfffffffffffffffd, 0x2, 0x0, 0x1, 0x401, 0x7fff, 0x1f, 0x5, 0x3, 0x3, 0xfff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30400000000ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000000000000000000000000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_names\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe0db14aa53d02f80, 0x3ff, 0x1, 0x0, 0x8, r2, 0x1c91}, 0x2c) 00:15:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8fffeff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'syzkaller1\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0xd, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff}, [@generic={0x101, 0xc0, 0x6, 0x3ff800000000}, @jmp={0x5, 0x5, 0xb, 0x1, 0x7, 0xfffffffffffffff0, 0xd}, @generic={0x0, 0x2, 0x1, 0xe6f4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x3, 0x2, 0x9, 0x6, 0xfffffffffffffff8, 0xffffffffffffffff}]}, &(0x7f0000000100)='GPL\x00', 0xffffffffffffff01, 0x86, &(0x7f0000000380)=""/134, 0x41100, 0x1, [], r1}, 0x48) [ 935.007124] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x1ff, 0xfffffffffffffffd, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3, 0x0, 0x200, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x1, 0x100000001, 0x6, 0x3, 0x72, 0xfffffffffffff801}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000440)=[{&(0x7f0000000140)="f1", 0x1, 0x8}, {&(0x7f0000000380)="ee3d4d2a4210e84784e7a78df12bbd13d999d8a9187cc28429021e55bc3ac9f4a5bdb3f4c3cdf43f3a46b31a9afd7d187dddba79a12435f33106e25e7944249806d0e3872119eba3047883d4394c7437a8", 0x51, 0x7}, {&(0x7f0000000400)="5ef8f1466f01e20dc601871789848d75d8b12aa9bc1075ee5b930ea405dbe7b29daf7a259342", 0x26, 0x5}], 0x4000, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000005c0)=@buf={0xdc, &(0x7f00000004c0)="e34197b22d19514d5bed469283e9703e68266b83674413354161de7149a1584e00f0c4ad8b480a1a3a4856b3473a22cad616259d5e9eb41728937dc63485473aaf92c6e68090d5587c52c061da41d050ccd6ab72b0ac8dcf88e8140e9186b14c668fe471c5d2481472edaf61e1f71c234694bb91dc093778543ce04d709d719c1f82313098b915f751adc62044fafcbe8a1481a841fc62af957eafaffa44fdebc96affce095012008b2c07e860011f218bbf4c1fe104e87428a27a5b3e307f9e1be8d8e1c6a1d0b7b8183e669edef0fe12f190f226f23da1906d7e52"}) [ 935.114085] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90768e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) sysinfo(&(0x7f0000000380)=""/133) 00:15:35 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) [ 935.377274] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 935.384986] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:35 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) fallocate(r0, 0x20, 0x0, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 935.493409] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:35 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf68bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 935.702978] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:37 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000009000000bff2f082186dc1bc934203000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405a97300000065040400010000000404000001007d60b7030000000000006a0a006981a25a9618ed7efe00000000850000000d000000b7000000000b000095000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000035c0)=@nat={'nat\x00', 0x19, 0x4, 0xf60, [0x20002640, 0x0, 0x0, 0x20002b00, 0x20003430], 0x0, &(0x7f0000002600), &(0x7f0000002640)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{{{0x0, 0x0, 0xe907, 'eql\x00', 'gre0\x00', 'sit0\x00', '\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], 0xa0, 0x128, 0x160, [@cgroup0={'cgroup\x00', 0x8, {{0x4, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0xcf5a, 0x5}}}, @arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}]}, @arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffc}}}}, {{{0xb, 0xc, 0x890d, 'veth1_to_team\x00', 'teql0\x00', '\x00', 'syzkaller1\x00', @local, [0xff, 0xff, 0x0, 0xff, 0xff], @local, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0x2a8, 0x2f8, 0x330, [@bpf0={'bpf\x00', 0x210, {{0x2f, [{0xc1f, 0x979, 0x8, 0xffffffff}, {0x78c02b79, 0xfff, 0x7, 0x64aa701c}, {0x7ff, 0x81, 0x7, 0x3}, {0x8, 0x2, 0xc21, 0x9}, {0x100000001, 0x7f, 0x8, 0x7f}, {0x2, 0x8, 0x10000, 0xffffffffffffff7f}, {0x0, 0x80, 0x7, 0xa586}, {0x0, 0x3ff, 0x8, 0x401}, {0x0, 0x5, 0x10000, 0x1000}, {0x20, 0x1000, 0x800, 0x100}, {0x8, 0x1, 0x81}, {0xffffffffffffffff, 0x6, 0x7a97, 0xffffffff80000001}, {0x4a2800000000000, 0xeab7, 0x80, 0x1000}, {0x6, 0x4, 0x9, 0x3}, {0x7, 0x0, 0x2, 0x8001}, {0x952d, 0xffffffffffffff01, 0x8, 0xfffffffffffffffc}, {0xade0, 0x1, 0x5, 0x6}, {0x9, 0x6, 0x8, 0x401}, {0x4, 0x67d, 0x6, 0x1}, {0x3, 0x3, 0xb2, 0x9}, {0xffffffff, 0x400, 0x6, 0xfffffffffffffc00}, {0x7ff, 0x0, 0x7ff, 0x6}, {0x1, 0x2, 0x20, 0x8}, {0x0, 0x956, 0x4, 0x8}, {0x3f, 0x6, 0x100, 0x8}, {0x9, 0x4, 0x94a, 0x1ff}, {0x10000, 0x3, 0x9, 0xff}, {0x4736, 0x8000, 0x6, 0xf999}, {0x4, 0x4, 0x4, 0x10000}, {0x5, 0x5, 0x8, 0x8}, {0x651f, 0x1, 0x9, 0x8bc}, {0x2, 0x101, 0x40}, {0x5, 0x6, 0xbdb5, 0xfffffffffffffff7}, {0x10000, 0x7e, 0x101, 0x9}, {0x4, 0x3f, 0xf6c, 0xffffffff}, {0x7f, 0x3, 0x80000000, 0x7}, {0x7, 0x5, 0x0, 0x6}, {0xffffffffffffff95, 0xd223, 0x7, 0x10000}, {0x55, 0x5, 0xbecd, 0x5c7}, {0x2, 0xe69, 0x81, 0x1}, {0x0, 0x20, 0x1000, 0xffffffffffffffff}, {0x7, 0x8, 0xff, 0x6}, {0xa02, 0x7fffffff, 0x1f, 0x9}, {0x7fff, 0xff, 0x8, 0x4de27048}, {0x8, 0x2, 0x9, 0x2389}, {0x6, 0x800, 0x3, 0x7}, {0x80000000, 0x7fffffff, 0xffffffffffffffff, 0x9}, {0x3, 0xecd, 0x80000000, 0xfffffffffffff8fb}, {0xffffffff, 0x9, 0x100000001, 0x9}, {0xfffffffffffffff7, 0x401, 0x10001, 0x2}, {0x57b631b, 0x1744da6a, 0x2b, 0x3}, {0x2, 0x8, 0x81, 0x100}, {0xffffffffffffffff, 0x3, 0x804, 0x6}, {0xb91, 0x0, 0x1, 0x6}, {0x3f, 0x3, 0x0, 0x7d12}, {0x11bb238c, 0xb228, 0x6, 0x6}, {0x7, 0x8, 0xc55, 0x3}, {0x69c, 0x2, 0x2, 0x9}, {0x89cd, 0x1, 0x3ff}, {0x3ba, 0x0, 0x5, 0xfffffffffffffff7}, {0xfffffffffffffbff, 0x6, 0x10000, 0x9}, {0x401, 0xfffffffffffffffb, 0x0, 0xf13d}, {0x20, 0x1000, 0x0, 0x80000000}, {0x401, 0x2, 0x3, 0x2}], 0x6}}}]}, [@common=@log={'log\x00', 0x28, {{0x2, "0447a8d5b0a1bad492a91492b7d08ce8aa019a36e40a4062413eaad97ca2", 0x8}}}]}, @arpreply={'arpreply\x00', 0x10, {{@local, 0xd31a42f399cfa386}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x3, 0x50, 0x7, 'veth1\x00', 'gretap0\x00', 'team_slave_0\x00', 'ifb0\x00', @remote, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], @broadcast, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], 0x858, 0x8c8, 0x900, [@u32={'u32\x00', 0x7c0, {{[{[{0x1, 0x2}, {0x0, 0x3}, {0x3, 0x2}, {0x6798, 0x3}, {0x9e8}, {0xbf2, 0x3}, {0x5, 0xa0687c29aa092392}, {0x1}, {0x9}, {0x0, 0x3}, {0x9}], [{0xffffffff, 0x3}, {0xbc, 0x8}, {0xa8f, 0x80000001}, {0x7, 0x1000}, {0x6b2, 0x7}, {0x4, 0x4}, {0xcc17, 0x10001}, {0x2, 0x1}, {0x100}, {0x9, 0x9}, {0x7fff, 0x6a6}], 0x7, 0x8}, {[{0x101}, {0xfffffffffffffffa, 0x2}, {0x400, 0x2}, {0x2, 0x3}, {0x3f, 0x1}, {0x81, 0x2}, {0x1}, {0x3}, {0xfffffffffffffffe, 0x3}, {0x2}, {0x8, 0x1}], [{0x3ff, 0x2}, {0x8000, 0x3}, {0x800, 0x9}, {0xfffffffffffeffff, 0xf2}, {0x7fff, 0x8}, {0x7fffffff, 0x82f}, {0x7, 0x6}, {0x7fff, 0x9}, {0x5, 0x10000}, {0x7, 0xfffffffffffffc39}, {0xfffffffffffffff9, 0xfffffffffffffff8}], 0x2, 0x3}, {[{0x9, 0x3}, {0x100, 0x1}, {0x401, 0x1}, {0x2, 0x3}, {0xd9}, {0x200}, {0x1000, 0x3}, {0xffffffffffff7fff, 0x2}, {0x6, 0x2}, {0x98d, 0x3}, {0xc54}], [{0x18, 0x8}, {0x40, 0x9}, {0x0, 0x3}, {0x44}, {0x7}, {0xdd8, 0x3ff}, {0x2, 0x2}, {0xf4a, 0xb}, {0x6, 0x1}, {0x3}, {0x6, 0x1}], 0x9, 0x2}, {[{0x40, 0x2}, {0x2, 0x1}, {0x8, 0x1}, {0x81, 0x1}, {0x9}, {0x101, 0x3}, {0x1e055aa5, 0x1}, {0xfa8, 0x3}, {0x4, 0x2}, {0x8, 0x2}, {0x4fb9}], [{0xb10, 0x5}, {0xcc03, 0x1f}, {0x59}, {0x7, 0x40}, {0x22dfa01d, 0x8}, {0x800, 0xfff}, {0x2, 0x17ec}, {0x0, 0x2}, {0x8001, 0x3ff}, {0x1, 0x20}, {0x9, 0x10001}], 0x9, 0x8}, {[{0x800}, {0x6, 0x1}, {0x1ff, 0x3}, {0xdb, 0x1}, {0x6, 0x3}, {0x3}, {0x8, 0x3}, {0x9, 0x1}, {0x6, 0x2}, {0x1}, {0x84, 0x3}], [{0x1, 0x40}, {0x8, 0x2}, {0x7fffffff, 0xffffffff00000001}, {0xfb7, 0x1}, {0x1f, 0x4}, {0x2, 0x100}, {0x0, 0x2000000}, {0x5, 0x2}, {0x101, 0xffffffffffffff67}, {0xfffffffffffffffc, 0x5}, {0xa4, 0xa1}], 0x2, 0x5}, {[{0x6, 0x3}, {0x7, 0x1}, {0x6}, {0x98, 0x3}, {0x3, 0x2}, {0xa239, 0x3}, {0x9, 0x3}, {0xa360}, {}, {0x80000000, 0x2}, {0x3, 0x2}], [{0x0, 0x8}, {0x10001, 0x1000}, {0x2, 0x81}, {0x4, 0x8}, {0x4, 0x2}, {0x10000, 0x6640}, {0x3}, {0x6, 0x7}, {0x400, 0x100000001}, {0x0, 0x4}, {0x1f, 0x9}], 0x9, 0x6}, {[{0xffffffffbe21f6b9, 0x3}, {0x9}, {0x6, 0x3}, {0x1f, 0x3}, {0x101}, {0x7, 0x3}, {0xfffffffffffff34f, 0x3}, {0x7, 0x1}, {0x9, 0x2}, {0x8273}, {0x100, 0x3}], [{0x2, 0x402c2283}, {0x3, 0x1}, {0x2, 0x4}, {0xfffffffffffffffe, 0x80000000}, {0xfffffffffffffe01, 0x3}, {0x0, 0xffffffffffffffff}, {0xfff, 0xffffffffffffff88}, {0x7f, 0x100000000}, {0x0, 0x80000001}, {0x400, 0x80000001}, {0x3f, 0x3}], 0x3, 0xb}, {[{0x62, 0x3}, {0x7}, {0x7}, {0x4, 0x3}, {0xffffffff00000001, 0x1}, {0x7}, {0xffffffffffffffff, 0x3}, {0x8001}, {0x8, 0x3}, {0x200, 0x3}, {0xfffffffffffffffa, 0x3}], [{0x9d6, 0x8b}, {0xb2e, 0x6}, {0x3, 0x75a8}, {0x19c3, 0x6}, {0x10001, 0x4000000000}, {0x7, 0x3f}, {0x6cb, 0x1}, {0x8, 0xba8}, {0x8000, 0x4}, {}, {0x3f, 0x2}], 0x5, 0x7}, {[{0x10000, 0x2}, {0x0, 0x1}, {0x100000001}, {0x6}, {0xfff, 0x3}, {0x7}, {0x100000000, 0x3}, {0x1, 0x2}, {0x3, 0x3}, {0x7, 0x3}, {0xff}], [{0x88, 0x3ff}, {0x1, 0x8}, {0x0, 0x1}, {0x8000, 0x4}, {0xff, 0xffffffff}, {0x2, 0x100000000}, {0x101, 0x273}, {0x6, 0x6}, {0xffffffffffffffff, 0x6}, {0x6, 0xfe9}, {0x25f6962a, 0xeb52}], 0x8, 0x1}, {[{0x80, 0x2}, {0x1, 0x3}, {0x3, 0x3}, {0x0, 0x3}, {0x5}, {0x9, 0x3}, {0x0, 0x3}, {0xc6, 0x3}, {0x0, 0x3}, {0xfffffffffffffff7, 0x3}, {0x7fff, 0x2}], [{0x7, 0x1}, {0x8001, 0x20}, {0x3, 0x925}, {0xc6, 0x100}, {0x0, 0x6}, {0x6, 0x2}, {0xe39f, 0x7}, {0x7, 0x1}, {0x4, 0xfff}, {0x9, 0x6163}, {0x6, 0x7}], 0x8, 0xb}, {[{0xff, 0x3}, {0x13f8, 0x2}, {0xffffffffffffffff, 0x3}, {0x1, 0x1}, {0x7, 0x2}, {0x3}, {0x8, 0x1}, {0x8, 0x3}, {0xde, 0x3}, {0x80000000}, {0x80000000}], [{0x4, 0x7}, {0x80000000, 0x7}, {0x4, 0xff}, {0x2, 0x7}, {0x8, 0x9}, {0x5, 0x3}, {0x2, 0x8001}, {0x71e5deeb, 0x80000000}, {0xfffffffffffffffa, 0x6}, {0x1, 0x8}, {0x100000000, 0x3}], 0x4, 0x6}], 0x6}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@local, 0xffffffffffffffff}}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}]}, @arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x40, 0x6b17, 'sit0\x00', 'irlan0\x00', 'gretap0\x00', 'teql0\x00', @remote, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], @empty, [0xff, 0x0, 0x0, 0xff], 0xa0, 0xd8, 0x110, [@pkttype={'pkttype\x00', 0x8, {{0x5, 0x1}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xfffffffffffffffe}}}]}, @arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xffffffffffffffff}}}}]}]}, 0xfd8) syz_execute_func(&(0x7f0000000040)="36f242afc441edf3c3c4610e58ca8f49409bacfffcff7f206766f2f2662ef021bd6e0f0000e6b7c4621993140f672e0fc74f00c421545526c4e1797e8c9d32233333") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000009000000bfa300000027d204e5110000000703000c00feffff7a0af0fff8ffffff79a4f0ff00000000b7abb300ffffffff2d6405000000000065040400010000000404000001007d60b7e2030000000000006a0a00fe000000e894000000000000008b24fc6f34449d38b5b0a792d836c2ecd70566ebbc9f05127e866abfdb64ca535cfdb58cd695af0ee5c3d55e777763e78128c40ff8c984b160"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:37 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)="6578743410", &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf05bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 937.999724] net_ratelimit: 2275 callbacks suppressed [ 937.999733] protocol 0800 is buggy, dev ip6tnl0 00:15:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:38 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000001480)='/dev/cec#\x00', 0x1, 0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001600)={r0, &(0x7f00000014c0)="e8936d5a2c5b5e34aecd982ba8751e6bb3ca98db54880d18d7f606efa33d81497b5bf12bcb9f8c532e3d96e473f4ecba6733e6406e5f35d058c361f21def977fb5fa1a89a9d1834e080ee3ffc552fc5946a2cc09fd13012a965b043bb1148a460c033ceefb3ece174e8e70d7809eca5cf24060f0250c6fa0dfd9394d53078e73c1ffd8a2e567dae961074ce8740a755a56be4a41de2e8b6e1a366203d8d0f7ede93b9422a397adf0c34e82157ba9dfa85ac651", &(0x7f0000001580)="48225a49a4ea85387ea118ab1392c33d5adec49886b6f30d83227b065718b00652df1fec2e82d987498f9f7c610ef35c861ef233496f4a6bfd79ff45047bbac721735208b8e6c3ec25668db3498619e5aeec297f69698331ad9a6ba0abacc0ca394e33c0be291ece675c0c4337162e66b3b2429f3d195824dfdbe093486f5bc7", 0x1}, 0x20) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x119000, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000001440)='cpuacct.usage_all\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000080)=0x4, 0x4) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000140)=0x8000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r3, 0x0, 0x99, 0x1000, &(0x7f0000000380)="b16b7c9fe76a4e60aad0228c72e32ebe45e935c2ac626de0bcd73448c3079cc59e2f2c2ba2681225e208f846dec26a9018ba58f3decf2ead4532d6c1da1089f52cbf008e7f12d2128152d706179971c4347e15022228b5a8f0bfa9d745251f3254a12757ba228e89e584fe42f7807d54499ec9698b57651f4a6019b2ac0e9405273e77e8f33009e40c5f465464a65b9e51063603102ef35c75", &(0x7f0000000440)=""/4096, 0x7f}, 0x28) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001640)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000b000404000001007d60b7038000000000006a0a00fe00000000850000000d000000b7000000000000009500000000f64253346f5da081b8e0ef33908d59f2ee4370e91d4ef800f09adecb9188741f7f5b5685ab86a189a42a2ad6a067ba6effb8ddd18151c056cfd66f1f360e41314d42471a0a2a3cd737c89c9e401594058bc91972cb7d02bb391829da5998867e4dea640f480aa7b9c8f9c5894f62973c70d6219496cd80e5bff437168a3b954b4582ff4cda44e256e6"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 938.064979] protocol 0800 is buggy, dev ip6tnl0 [ 938.076008] protocol 0800 is buggy, dev ip6tnl0 [ 938.082214] protocol 0800 is buggy, dev ip6tnl0 [ 938.087187] protocol 0800 is buggy, dev ip6tnl0 [ 938.092538] protocol 0800 is buggy, dev ip6tnl0 [ 938.120704] protocol 0800 is buggy, dev ip6tnl0 [ 938.136351] protocol 0800 is buggy, dev ip6tnl0 [ 938.167982] protocol 0800 is buggy, dev ip6tnl0 [ 938.183733] protocol 0800 is buggy, dev ip6tnl0 00:15:38 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:38 executing program 2: pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000440)=0x7fffffff, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e680800", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:38 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff0000000000060000fffff7ff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x4, 0x200) fcntl$setstatus(r0, 0x4, 0x40800) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000080)=0x5038, 0x4) getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000100)=0x273, &(0x7f0000000140)=0x4) [ 938.365535] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 [ 938.462017] EXT4-fs (loop1): inodes count not valid: 167772421 vs 256 00:15:41 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7f}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:15:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x2200, 0x0) syz_open_dev$mouse(&(0x7f0000000640)='/dev/input/mouse#\x00', 0x3, 0x4000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)={0x88, r3, 0x110, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x33}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1f}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000810}, 0x20000000) 00:15:41 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)="657874348c", &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e106558", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:41 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x3) 00:15:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086607, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000540)='cgroupwlan1^\x00', r0}, 0x5) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) openat$cgroup_ro(r0, &(0x7f00000005c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x0, 0x401, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x0, 0x7fff, 0x80000000, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r3, &(0x7f0000000980), 0xffffff4d) close(r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/84) 00:15:41 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)="65787434fc", &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:41 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000040)={0x1, "0dc821f1e8d8b5ac96b0d0355b45f3c97b4f3f8b49325957d2441c3734d22cf3", 0x800, 0x401, 0x7fff, 0x6, 0x5}) 00:15:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e1088a8", &(0x7f0000000300)=""/41, 0x68}, 0x28) 00:15:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0x202, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x68}, 0x28) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x111140) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000080)={0x0, 0x1, 0x59, 0xb1, 0x7f}, 0xc) 00:15:41 executing program 1: syz_mount_image$ext4(&(0x7f0000001880)='ext4z', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec00000001000000000000000000000000200000cef1000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[]) 00:15:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e1086dd", &(0x7f0000000300)=""/41, 0x68}, 0x28) [ 941.762549] ================================================================== [ 941.770307] BUG: KASAN: slab-out-of-bounds in ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 941.778129] Read of size 1 at addr ffff8801b463ae87 by task syz-executor0/5554 [ 941.785487] [ 941.787139] CPU: 1 PID: 5554 Comm: syz-executor0 Not tainted 4.20.0-rc1+ #109 [ 941.794432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.803798] Call Trace: [ 941.806397] dump_stack+0x244/0x39d [ 941.810043] ? dump_stack_print_info.cold.1+0x20/0x20 [ 941.815250] ? printk+0xa7/0xcf [ 941.818556] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 941.823334] print_address_description.cold.7+0x9/0x1ff [ 941.828713] kasan_report.cold.8+0x242/0x309 [ 941.828736] ? ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 941.828756] __asan_report_load1_noabort+0x14/0x20 [ 941.828771] ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 941.828800] ip6_tnl_start_xmit+0x49f/0x25a0 [ 941.828819] ? ip6_tnl_xmit+0x3730/0x3730 [ 941.838354] ? lock_downgrade+0x900/0x900 [ 941.838373] ? check_preemption_disabled+0x48/0x280 [ 941.838404] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 941.838420] ? kasan_check_read+0x11/0x20 [ 941.838441] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 941.838454] ? rcu_softirq_qs+0x20/0x20 [ 941.838481] ? zap_class+0x640/0x640 [ 941.888062] ? dev_queue_xmit_nit+0x967/0xc90 [ 941.892580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 941.898137] ? check_preemption_disabled+0x48/0x280 [ 941.903194] ? __lock_is_held+0xb5/0x140 [ 941.907292] dev_hard_start_xmit+0x295/0xc80 [ 941.911713] ? dev_direct_xmit+0x6b0/0x6b0 [ 941.915945] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 941.921487] ? netif_skb_features+0x690/0xb70 [ 941.925992] ? rcu_softirq_qs+0x20/0x20 [ 941.930013] ? validate_xmit_xfrm+0x1ef/0xda0 [ 941.934539] ? validate_xmit_skb+0x80c/0xf30 [ 941.938943] ? netif_skb_features+0xb70/0xb70 [ 941.943445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 941.948975] ? check_preemption_disabled+0x48/0x280 [ 941.953979] ? check_preemption_disabled+0x48/0x280 [ 941.958988] __dev_queue_xmit+0x2f71/0x3ad0 [ 941.963315] ? save_stack+0x43/0xd0 [ 941.966936] ? kasan_kmalloc+0xc7/0xe0 [ 941.970825] ? __kmalloc_node_track_caller+0x50/0x70 [ 941.975923] ? netdev_pick_tx+0x310/0x310 [ 941.980079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 941.985604] ? check_preemption_disabled+0x48/0x280 [ 941.990609] ? __lock_is_held+0xb5/0x140 [ 941.994660] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 941.999680] ? skb_release_data+0x1c4/0x880 [ 942.003997] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 942.009264] ? kasan_unpoison_shadow+0x35/0x50 [ 942.013854] ? skb_tx_error+0x2f0/0x2f0 [ 942.017824] ? __kmalloc_node_track_caller+0x50/0x70 [ 942.022918] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 942.028471] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 942.034017] ? kasan_check_write+0x14/0x20 [ 942.038256] ? pskb_expand_head+0x6b3/0x10f0 [ 942.042658] ? skb_release_data+0x880/0x880 [ 942.046981] ? __alloc_skb+0x770/0x770 [ 942.050875] ? __lock_is_held+0xb5/0x140 [ 942.054940] ? kasan_check_write+0x14/0x20 [ 942.059177] ? __skb_clone+0x6c7/0xa00 [ 942.063056] ? __copy_skb_header+0x6b0/0x6b0 [ 942.067468] ? kmem_cache_alloc+0x33a/0x730 [ 942.071794] ? skb_ensure_writable+0x15e/0x640 [ 942.076370] dev_queue_xmit+0x17/0x20 [ 942.080157] ? dev_queue_xmit+0x17/0x20 [ 942.084121] __bpf_redirect+0x5cf/0xb20 [ 942.088100] bpf_clone_redirect+0x2f6/0x490 [ 942.092442] bpf_prog_759a992c578a3894+0xe80/0x1000 [ 942.097464] ? __sched_text_start+0x8/0x8 [ 942.101620] ? lock_downgrade+0x900/0x900 [ 942.105778] ? find_held_lock+0x36/0x1c0 [ 942.109849] ? lock_acquire+0x1ed/0x520 [ 942.113811] ? bpf_test_run+0x3cb/0x780 [ 942.117774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 942.123302] ? check_preemption_disabled+0x48/0x280 [ 942.128311] ? kasan_check_read+0x11/0x20 [ 942.132452] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 942.137715] ? rcu_softirq_qs+0x20/0x20 [ 942.141696] ? preempt_schedule+0x4d/0x60 [ 942.145855] ? ___preempt_schedule+0x16/0x18 [ 942.150258] ? bpf_test_run+0x25d/0x780 [ 942.154225] ? netlink_diag_dump+0x2a0/0x2a0 [ 942.158624] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 942.164152] ? bpf_test_init.isra.10+0x70/0x100 [ 942.168817] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 942.173567] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 942.178397] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 942.183924] ? fput+0x130/0x1a0 [ 942.187195] ? __bpf_prog_get+0x9b/0x290 [ 942.191247] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 942.196077] ? bpf_prog_test_run+0x130/0x1a0 [ 942.200494] ? __x64_sys_bpf+0x3d8/0x520 [ 942.204540] ? bpf_prog_get+0x20/0x20 [ 942.208339] ? do_syscall_64+0x1b9/0x820 [ 942.212387] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 942.217739] ? syscall_return_slowpath+0x5e0/0x5e0 [ 942.222674] ? trace_hardirqs_on_caller+0x310/0x310 [ 942.227686] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 942.232753] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 942.239412] ? __switch_to_asm+0x40/0x70 [ 942.243464] ? __switch_to_asm+0x34/0x70 [ 942.247517] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 942.252348] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.257702] [ 942.259400] Allocated by task 5554: [ 942.263026] save_stack+0x43/0xd0 [ 942.266504] kasan_kmalloc+0xc7/0xe0 [ 942.270202] __kmalloc_node_track_caller+0x50/0x70 [ 942.275117] __kmalloc_reserve.isra.40+0x41/0xe0 [ 942.279871] pskb_expand_head+0x230/0x10f0 [ 942.284089] skb_ensure_writable+0x3dd/0x640 [ 942.288490] bpf_clone_redirect+0x14a/0x490 [ 942.292805] bpf_prog_759a992c578a3894+0xe80/0x1000 [ 942.297796] [ 942.299417] Freed by task 4606: [ 942.302689] save_stack+0x43/0xd0 [ 942.306127] __kasan_slab_free+0x102/0x150 [ 942.310346] kasan_slab_free+0xe/0x10 [ 942.314139] kfree+0xcf/0x230 [ 942.317308] load_elf_binary+0x25b4/0x5620 [ 942.321531] search_binary_handler+0x17d/0x570 [ 942.326096] __do_execve_file.isra.33+0x1661/0x25d0 [ 942.331096] __x64_sys_execve+0x8f/0xc0 [ 942.335069] do_syscall_64+0x1b9/0x820 [ 942.338960] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.344126] [ 942.345751] The buggy address belongs to the object at ffff8801b463ac80 [ 942.345751] which belongs to the cache kmalloc-512 of size 512 [ 942.358415] The buggy address is located 7 bytes to the right of [ 942.358415] 512-byte region [ffff8801b463ac80, ffff8801b463ae80) [ 942.370617] The buggy address belongs to the page: [ 942.375531] page:ffffea0006d18e80 count:1 mapcount:0 mapping:ffff8801da800940 index:0x0 [ 942.383657] flags: 0x2fffc0000000200(slab) [ 942.387889] raw: 02fffc0000000200 ffffea00070e05c8 ffffea0006d3aac8 ffff8801da800940 [ 942.395764] raw: 0000000000000000 ffff8801b463a000 0000000100000006 0000000000000000 [ 942.403646] page dumped because: kasan: bad access detected [ 942.409362] [ 942.410969] Memory state around the buggy address: [ 942.415889] ffff8801b463ad80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 942.423248] ffff8801b463ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 942.430592] >ffff8801b463ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 942.437952] ^ [ 942.441304] ffff8801b463af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 942.448648] ffff8801b463af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 942.455991] ================================================================== [ 942.463327] Disabling lock debugging due to kernel taint [ 942.468906] Kernel panic - not syncing: panic_on_warn set ... [ 942.474818] CPU: 1 PID: 5554 Comm: syz-executor0 Tainted: G B 4.20.0-rc1+ #109 [ 942.483478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.492840] Call Trace: [ 942.495458] dump_stack+0x244/0x39d [ 942.499102] ? dump_stack_print_info.cold.1+0x20/0x20 [ 942.501340] kobject: 'loop4' (000000007154e7f5): kobject_uevent_env [ 942.504402] panic+0x2ad/0x55c [ 942.512975] kobject: 'loop4' (000000007154e7f5): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 942.514163] ? add_taint.cold.5+0x16/0x16 [ 942.514184] ? trace_hardirqs_on+0xb4/0x310 [ 942.514204] kasan_end_report+0x47/0x4f [ 942.536055] kasan_report.cold.8+0x76/0x309 [ 942.540387] ? ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 942.545499] __asan_report_load1_noabort+0x14/0x20 [ 942.550438] ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 942.555385] ip6_tnl_start_xmit+0x49f/0x25a0 [ 942.559802] ? ip6_tnl_xmit+0x3730/0x3730 [ 942.563951] ? lock_downgrade+0x900/0x900 [ 942.568101] ? check_preemption_disabled+0x48/0x280 [ 942.573120] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 942.578048] ? kasan_check_read+0x11/0x20 [ 942.582195] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 942.587479] ? rcu_softirq_qs+0x20/0x20 [ 942.591481] ? zap_class+0x640/0x640 [ 942.595194] ? dev_queue_xmit_nit+0x967/0xc90 [ 942.599712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 942.605250] ? check_preemption_disabled+0x48/0x280 [ 942.610272] ? __lock_is_held+0xb5/0x140 [ 942.614345] dev_hard_start_xmit+0x295/0xc80 [ 942.619259] ? dev_direct_xmit+0x6b0/0x6b0 [ 942.623496] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 942.629030] ? netif_skb_features+0x690/0xb70 [ 942.633519] ? rcu_softirq_qs+0x20/0x20 [ 942.637496] ? validate_xmit_xfrm+0x1ef/0xda0 [ 942.641997] ? validate_xmit_skb+0x80c/0xf30 [ 942.646417] ? netif_skb_features+0xb70/0xb70 [ 942.650916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 942.656463] ? check_preemption_disabled+0x48/0x280 [ 942.661481] ? check_preemption_disabled+0x48/0x280 [ 942.666509] __dev_queue_xmit+0x2f71/0x3ad0 [ 942.670832] ? save_stack+0x43/0xd0 [ 942.674462] ? kasan_kmalloc+0xc7/0xe0 [ 942.678351] ? __kmalloc_node_track_caller+0x50/0x70 [ 942.683478] ? netdev_pick_tx+0x310/0x310 [ 942.687654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 942.693205] ? check_preemption_disabled+0x48/0x280 [ 942.698227] ? __lock_is_held+0xb5/0x140 [ 942.702292] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 942.707307] ? skb_release_data+0x1c4/0x880 [ 942.711645] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 942.716944] ? kasan_unpoison_shadow+0x35/0x50 [ 942.721552] ? skb_tx_error+0x2f0/0x2f0 [ 942.725567] ? __kmalloc_node_track_caller+0x50/0x70 [ 942.730689] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 942.736240] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 942.741783] ? kasan_check_write+0x14/0x20 [ 942.746018] ? pskb_expand_head+0x6b3/0x10f0 [ 942.750441] ? skb_release_data+0x880/0x880 [ 942.754765] ? __alloc_skb+0x770/0x770 [ 942.758670] ? __lock_is_held+0xb5/0x140 [ 942.762741] ? kasan_check_write+0x14/0x20 [ 942.766976] ? __skb_clone+0x6c7/0xa00 [ 942.770861] ? __copy_skb_header+0x6b0/0x6b0 [ 942.775281] ? kmem_cache_alloc+0x33a/0x730 [ 942.779607] ? skb_ensure_writable+0x15e/0x640 [ 942.784204] dev_queue_xmit+0x17/0x20 [ 942.788004] ? dev_queue_xmit+0x17/0x20 [ 942.791977] __bpf_redirect+0x5cf/0xb20 [ 942.795954] bpf_clone_redirect+0x2f6/0x490 [ 942.800284] bpf_prog_759a992c578a3894+0xe80/0x1000 [ 942.805301] ? __sched_text_start+0x8/0x8 [ 942.809450] ? lock_downgrade+0x900/0x900 [ 942.813605] ? find_held_lock+0x36/0x1c0 [ 942.817679] ? lock_acquire+0x1ed/0x520 [ 942.821686] ? bpf_test_run+0x3cb/0x780 [ 942.825660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 942.831209] ? check_preemption_disabled+0x48/0x280 [ 942.836239] ? kasan_check_read+0x11/0x20 [ 942.840385] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 942.845688] ? rcu_softirq_qs+0x20/0x20 [ 942.849677] ? preempt_schedule+0x4d/0x60 [ 942.853833] ? ___preempt_schedule+0x16/0x18 [ 942.858247] ? bpf_test_run+0x25d/0x780 [ 942.862227] ? netlink_diag_dump+0x2a0/0x2a0 [ 942.866639] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 942.872187] ? bpf_test_init.isra.10+0x70/0x100 [ 942.876863] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 942.881624] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 942.886466] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 942.892036] ? fput+0x130/0x1a0 [ 942.895357] ? __bpf_prog_get+0x9b/0x290 [ 942.899418] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 942.904264] ? bpf_prog_test_run+0x130/0x1a0 [ 942.908702] ? __x64_sys_bpf+0x3d8/0x520 [ 942.912764] ? bpf_prog_get+0x20/0x20 [ 942.916591] ? do_syscall_64+0x1b9/0x820 [ 942.920649] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 942.926021] ? syscall_return_slowpath+0x5e0/0x5e0 [ 942.930952] ? trace_hardirqs_on_caller+0x310/0x310 [ 942.935967] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 942.940982] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 942.947650] ? __switch_to_asm+0x40/0x70 [ 942.951719] ? __switch_to_asm+0x34/0x70 [ 942.955785] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 942.960630] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.967010] Kernel Offset: disabled [ 942.970635] Rebooting in 86400 seconds..