f0000000800)}, 0x0) socketpair(0x1, 0x0, 0x1, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0x0, 0x5, 0x10}, 0xffffffa4) 18:43:37 executing program 5: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x800000000002, 0x0) recvmsg$kcm(r0, &(0x7f0000002c00)={&(0x7f00000017c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001900)=""/210, 0xd2}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='io.stat\x00', 0x0, 0x0) openat$cgroup_int(r1, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cpuset.effective_cpus\x00', 0x0, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000540)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuse4.effectiv\x03~I!\xbe\x13e_mems\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xfffffffffffffffe) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'nr0\x01\x01\x00', 0x2}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1d}, {0x16}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x04\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socket$kcm(0x10, 0x1000000000000002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x80000, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'sit\x00', 0x400}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x0, 0x1, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0x0, 0x5, 0x10}, 0xffffffa4) 18:43:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x3, 0x300) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 18:43:37 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000300)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'memory'}]}, 0x8) 18:43:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x3, 0x300) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 18:43:38 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000300)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'memory'}]}, 0x8) 18:43:38 executing program 1: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x800000000002, 0x0) recvmsg$kcm(r0, &(0x7f0000002c00)={&(0x7f00000017c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001900)=""/210, 0xd2}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='io.stat\x00', 0x0, 0x0) openat$cgroup_int(r1, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cpuset.effective_cpus\x00', 0x0, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000540)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuse4.effectiv\x03~I!\xbe\x13e_mems\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xfffffffffffffffe) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'nr0\x01\x01\x00', 0x2}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1d}, {0x16}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x04\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socket$kcm(0x10, 0x1000000000000002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x80000, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'sit\x00', 0x400}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x0, 0x1, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0x0, 0x5, 0x10}, 0xffffffa4) 18:43:38 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000300)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'memory'}]}, 0x8) [ 324.700294][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 324.706179][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:43:38 executing program 5: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x800000000002, 0x0) recvmsg$kcm(r0, &(0x7f0000002c00)={&(0x7f00000017c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001900)=""/210, 0xd2}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='io.stat\x00', 0x0, 0x0) openat$cgroup_int(r1, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cpuset.effective_cpus\x00', 0x0, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000540)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuse4.effectiv\x03~I!\xbe\x13e_mems\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xfffffffffffffffe) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'nr0\x01\x01\x00', 0x2}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1d}, {0x16}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x04\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socket$kcm(0x10, 0x1000000000000002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x80000, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'sit\x00', 0x400}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x0, 0x1, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0x0, 0x5, 0x10}, 0xffffffa4) [ 324.780304][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 324.786540][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:43:38 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000300)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'memory'}]}, 0x8) 18:43:38 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000300)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'memory'}]}, 0x8) 18:43:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x3, 0x300) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 18:43:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x3, 0x300) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 18:43:38 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000300)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'memory'}]}, 0x8) 18:43:38 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000300)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'memory'}]}, 0x8) 18:43:38 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000dc0)=0x2, 0x4) 18:43:39 executing program 4: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$sock(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x20000000) 18:43:39 executing program 1: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x800000000002, 0x0) recvmsg$kcm(r0, &(0x7f0000002c00)={&(0x7f00000017c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001900)=""/210, 0xd2}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='io.stat\x00', 0x0, 0x0) openat$cgroup_int(r1, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cpuset.effective_cpus\x00', 0x0, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000540)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuse4.effectiv\x03~I!\xbe\x13e_mems\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xfffffffffffffffe) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'nr0\x01\x01\x00', 0x2}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1d}, {0x16}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x04\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socket$kcm(0x10, 0x1000000000000002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x80000, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'sit\x00', 0x400}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x0, 0x1, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0x0, 0x5, 0x10}, 0xffffffa4) 18:43:39 executing program 5: socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) 18:43:39 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) 18:43:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8934, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\x03\xaa\xac\x11x\xf4D3A}\xda\xac\xff\x82q\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') 18:43:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x3, 0x300) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 18:43:39 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) 18:43:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x3, 0x300) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 326.062795][ C0] net_ratelimit: 2 callbacks suppressed [ 326.062838][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 326.074998][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:43:39 executing program 5: socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) [ 326.140277][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 326.146084][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:43:39 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) 18:43:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8934, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\x03\xaa\xac\x11x\xf4D3A}\xda\xac\xff\x82q\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') 18:43:39 executing program 1: socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) 18:43:40 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) 18:43:40 executing program 5: socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) 18:43:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xb, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) 18:43:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\xeb\xff\xff(1\x18\xc7\xc1\xde\xdc(,J\\\xc4hM=\xf4\x04\xd0\xe9\'rT\x8dm\x1a?\x1a\b\x93\x82\xbf\xfe\x83\xcb4tX{$\x9f\xbfHY\x1e;\xd0\xcf\xdb&\x12G\xfd\xd7\xe71\xd8K\x9b\xc9\x04C\xf5$\xd0\x93k\x12u\x9eMM\x03\x00\x00\x00\xc8\x83\x16\x9c2)\xaa\x9fh\xa4\xd2\x0f\x98.\x06t^\xc0\xcd\x95\x81*\xece1\x9e*3\xfa\xb5=\xd2\x1e-\xd3]}\xa7\xbfDZn\xd4\x82\x19\xfb\x1bjE\xc3D\xd8\xd56G\xd9\xc3\x90\xf5\xb9\xdc\x98\xb8\x8f=\xdf\xf0,e\x1dl\xe0\xc5\x80\a\xb1\xad\xbf\xc5\x88!j\xce\x00\x00\x00\x00\x00\x00', 0x4, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:43:40 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) close(r0) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x7, 0x401, 0xba, 0x0, 0x0, 0x4000, 0x1, 0x7, 0x5, 0xffffffff, 0x4, 0x0, 0x6, 0x1000, 0x3ff, 0x8, 0xffff, 0xefcd, 0x7, 0x5, 0x1, 0x101, 0x10001, 0x3, 0x6, 0x40, 0x9e13, 0x9, 0xfffffffffffffffa, 0x1ed000000000000, 0xfffffffffffffffc, 0x2bd3, 0x7fff, 0x4408, 0xfffffffffffeffff, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x900, 0xfff, 0x7fff, 0x6, 0x80, 0x8, 0x732}, r2, 0xe, r0, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)}, 0x44000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/97, 0x61}], 0x1}, 0x3) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x8953, &(0x7f0000000040)=0x2) 18:43:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8934, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\x03\xaa\xac\x11x\xf4D3A}\xda\xac\xff\x82q\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') 18:43:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\xeb\xff\xff(1\x18\xc7\xc1\xde\xdc(,J\\\xc4hM=\xf4\x04\xd0\xe9\'rT\x8dm\x1a?\x1a\b\x93\x82\xbf\xfe\x83\xcb4tX{$\x9f\xbfHY\x1e;\xd0\xcf\xdb&\x12G\xfd\xd7\xe71\xd8K\x9b\xc9\x04C\xf5$\xd0\x93k\x12u\x9eMM\x03\x00\x00\x00\xc8\x83\x16\x9c2)\xaa\x9fh\xa4\xd2\x0f\x98.\x06t^\xc0\xcd\x95\x81*\xece1\x9e*3\xfa\xb5=\xd2\x1e-\xd3]}\xa7\xbfDZn\xd4\x82\x19\xfb\x1bjE\xc3D\xd8\xd56G\xd9\xc3\x90\xf5\xb9\xdc\x98\xb8\x8f=\xdf\xf0,e\x1dl\xe0\xc5\x80\a\xb1\xad\xbf\xc5\x88!j\xce\x00\x00\x00\x00\x00\x00', 0x4, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:43:40 executing program 1: socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) 18:43:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\xeb\xff\xff(1\x18\xc7\xc1\xde\xdc(,J\\\xc4hM=\xf4\x04\xd0\xe9\'rT\x8dm\x1a?\x1a\b\x93\x82\xbf\xfe\x83\xcb4tX{$\x9f\xbfHY\x1e;\xd0\xcf\xdb&\x12G\xfd\xd7\xe71\xd8K\x9b\xc9\x04C\xf5$\xd0\x93k\x12u\x9eMM\x03\x00\x00\x00\xc8\x83\x16\x9c2)\xaa\x9fh\xa4\xd2\x0f\x98.\x06t^\xc0\xcd\x95\x81*\xece1\x9e*3\xfa\xb5=\xd2\x1e-\xd3]}\xa7\xbfDZn\xd4\x82\x19\xfb\x1bjE\xc3D\xd8\xd56G\xd9\xc3\x90\xf5\xb9\xdc\x98\xb8\x8f=\xdf\xf0,e\x1dl\xe0\xc5\x80\a\xb1\xad\xbf\xc5\x88!j\xce\x00\x00\x00\x00\x00\x00', 0x4, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:43:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xb, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) 18:43:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\xeb\xff\xff(1\x18\xc7\xc1\xde\xdc(,J\\\xc4hM=\xf4\x04\xd0\xe9\'rT\x8dm\x1a?\x1a\b\x93\x82\xbf\xfe\x83\xcb4tX{$\x9f\xbfHY\x1e;\xd0\xcf\xdb&\x12G\xfd\xd7\xe71\xd8K\x9b\xc9\x04C\xf5$\xd0\x93k\x12u\x9eMM\x03\x00\x00\x00\xc8\x83\x16\x9c2)\xaa\x9fh\xa4\xd2\x0f\x98.\x06t^\xc0\xcd\x95\x81*\xece1\x9e*3\xfa\xb5=\xd2\x1e-\xd3]}\xa7\xbfDZn\xd4\x82\x19\xfb\x1bjE\xc3D\xd8\xd56G\xd9\xc3\x90\xf5\xb9\xdc\x98\xb8\x8f=\xdf\xf0,e\x1dl\xe0\xc5\x80\a\xb1\xad\xbf\xc5\x88!j\xce\x00\x00\x00\x00\x00\x00', 0x4, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:43:40 executing program 5: socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) 18:43:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xb, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) 18:43:40 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) close(r0) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x7, 0x401, 0xba, 0x0, 0x0, 0x4000, 0x1, 0x7, 0x5, 0xffffffff, 0x4, 0x0, 0x6, 0x1000, 0x3ff, 0x8, 0xffff, 0xefcd, 0x7, 0x5, 0x1, 0x101, 0x10001, 0x3, 0x6, 0x40, 0x9e13, 0x9, 0xfffffffffffffffa, 0x1ed000000000000, 0xfffffffffffffffc, 0x2bd3, 0x7fff, 0x4408, 0xfffffffffffeffff, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x900, 0xfff, 0x7fff, 0x6, 0x80, 0x8, 0x732}, r2, 0xe, r0, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)}, 0x44000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/97, 0x61}], 0x1}, 0x3) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x8953, &(0x7f0000000040)=0x2) 18:43:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8934, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\x03\xaa\xac\x11x\xf4D3A}\xda\xac\xff\x82q\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') 18:43:40 executing program 1: socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) 18:43:41 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) close(r0) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x7, 0x401, 0xba, 0x0, 0x0, 0x4000, 0x1, 0x7, 0x5, 0xffffffff, 0x4, 0x0, 0x6, 0x1000, 0x3ff, 0x8, 0xffff, 0xefcd, 0x7, 0x5, 0x1, 0x101, 0x10001, 0x3, 0x6, 0x40, 0x9e13, 0x9, 0xfffffffffffffffa, 0x1ed000000000000, 0xfffffffffffffffc, 0x2bd3, 0x7fff, 0x4408, 0xfffffffffffeffff, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x900, 0xfff, 0x7fff, 0x6, 0x80, 0x8, 0x732}, r2, 0xe, r0, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)}, 0x44000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/97, 0x61}], 0x1}, 0x3) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x8953, &(0x7f0000000040)=0x2) 18:43:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xb, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) 18:43:41 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) close(r0) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x7, 0x401, 0xba, 0x0, 0x0, 0x4000, 0x1, 0x7, 0x5, 0xffffffff, 0x4, 0x0, 0x6, 0x1000, 0x3ff, 0x8, 0xffff, 0xefcd, 0x7, 0x5, 0x1, 0x101, 0x10001, 0x3, 0x6, 0x40, 0x9e13, 0x9, 0xfffffffffffffffa, 0x1ed000000000000, 0xfffffffffffffffc, 0x2bd3, 0x7fff, 0x4408, 0xfffffffffffeffff, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x900, 0xfff, 0x7fff, 0x6, 0x80, 0x8, 0x732}, r2, 0xe, r0, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)}, 0x44000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/97, 0x61}], 0x1}, 0x3) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x8953, &(0x7f0000000040)=0x2) 18:43:41 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) close(r0) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x7, 0x401, 0xba, 0x0, 0x0, 0x4000, 0x1, 0x7, 0x5, 0xffffffff, 0x4, 0x0, 0x6, 0x1000, 0x3ff, 0x8, 0xffff, 0xefcd, 0x7, 0x5, 0x1, 0x101, 0x10001, 0x3, 0x6, 0x40, 0x9e13, 0x9, 0xfffffffffffffffa, 0x1ed000000000000, 0xfffffffffffffffc, 0x2bd3, 0x7fff, 0x4408, 0xfffffffffffeffff, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x900, 0xfff, 0x7fff, 0x6, 0x80, 0x8, 0x732}, r2, 0xe, r0, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)}, 0x44000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/97, 0x61}], 0x1}, 0x3) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x8953, &(0x7f0000000040)=0x2) 18:43:41 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) close(r0) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x7, 0x401, 0xba, 0x0, 0x0, 0x4000, 0x1, 0x7, 0x5, 0xffffffff, 0x4, 0x0, 0x6, 0x1000, 0x3ff, 0x8, 0xffff, 0xefcd, 0x7, 0x5, 0x1, 0x101, 0x10001, 0x3, 0x6, 0x40, 0x9e13, 0x9, 0xfffffffffffffffa, 0x1ed000000000000, 0xfffffffffffffffc, 0x2bd3, 0x7fff, 0x4408, 0xfffffffffffeffff, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x900, 0xfff, 0x7fff, 0x6, 0x80, 0x8, 0x732}, r2, 0xe, r0, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)}, 0x44000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/97, 0x61}], 0x1}, 0x3) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x8953, &(0x7f0000000040)=0x2) 18:43:41 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) close(r0) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x7, 0x401, 0xba, 0x0, 0x0, 0x4000, 0x1, 0x7, 0x5, 0xffffffff, 0x4, 0x0, 0x6, 0x1000, 0x3ff, 0x8, 0xffff, 0xefcd, 0x7, 0x5, 0x1, 0x101, 0x10001, 0x3, 0x6, 0x40, 0x9e13, 0x9, 0xfffffffffffffffa, 0x1ed000000000000, 0xfffffffffffffffc, 0x2bd3, 0x7fff, 0x4408, 0xfffffffffffeffff, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x900, 0xfff, 0x7fff, 0x6, 0x80, 0x8, 0x732}, r2, 0xe, r0, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)}, 0x44000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/97, 0x61}], 0x1}, 0x3) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x8953, &(0x7f0000000040)=0x2) 18:43:41 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) close(r0) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x7, 0x401, 0xba, 0x0, 0x0, 0x4000, 0x1, 0x7, 0x5, 0xffffffff, 0x4, 0x0, 0x6, 0x1000, 0x3ff, 0x8, 0xffff, 0xefcd, 0x7, 0x5, 0x1, 0x101, 0x10001, 0x3, 0x6, 0x40, 0x9e13, 0x9, 0xfffffffffffffffa, 0x1ed000000000000, 0xfffffffffffffffc, 0x2bd3, 0x7fff, 0x4408, 0xfffffffffffeffff, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x900, 0xfff, 0x7fff, 0x6, 0x80, 0x8, 0x732}, r2, 0xe, r0, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)}, 0x44000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/97, 0x61}], 0x1}, 0x3) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x8953, &(0x7f0000000040)=0x2) 18:43:41 executing program 1: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xa3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c) 18:43:41 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) close(r0) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x7, 0x401, 0xba, 0x0, 0x0, 0x4000, 0x1, 0x7, 0x5, 0xffffffff, 0x4, 0x0, 0x6, 0x1000, 0x3ff, 0x8, 0xffff, 0xefcd, 0x7, 0x5, 0x1, 0x101, 0x10001, 0x3, 0x6, 0x40, 0x9e13, 0x9, 0xfffffffffffffffa, 0x1ed000000000000, 0xfffffffffffffffc, 0x2bd3, 0x7fff, 0x4408, 0xfffffffffffeffff, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x900, 0xfff, 0x7fff, 0x6, 0x80, 0x8, 0x732}, r2, 0xe, r0, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)}, 0x44000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/97, 0x61}], 0x1}, 0x3) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x8953, &(0x7f0000000040)=0x2) 18:43:41 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) close(r0) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x7, 0x401, 0xba, 0x0, 0x0, 0x4000, 0x1, 0x7, 0x5, 0xffffffff, 0x4, 0x0, 0x6, 0x1000, 0x3ff, 0x8, 0xffff, 0xefcd, 0x7, 0x5, 0x1, 0x101, 0x10001, 0x3, 0x6, 0x40, 0x9e13, 0x9, 0xfffffffffffffffa, 0x1ed000000000000, 0xfffffffffffffffc, 0x2bd3, 0x7fff, 0x4408, 0xfffffffffffeffff, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x900, 0xfff, 0x7fff, 0x6, 0x80, 0x8, 0x732}, r2, 0xe, r0, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)}, 0x44000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/97, 0x61}], 0x1}, 0x3) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x8953, &(0x7f0000000040)=0x2) 18:43:41 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) close(r0) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x7, 0x401, 0xba, 0x0, 0x0, 0x4000, 0x1, 0x7, 0x5, 0xffffffff, 0x4, 0x0, 0x6, 0x1000, 0x3ff, 0x8, 0xffff, 0xefcd, 0x7, 0x5, 0x1, 0x101, 0x10001, 0x3, 0x6, 0x40, 0x9e13, 0x9, 0xfffffffffffffffa, 0x1ed000000000000, 0xfffffffffffffffc, 0x2bd3, 0x7fff, 0x4408, 0xfffffffffffeffff, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x900, 0xfff, 0x7fff, 0x6, 0x80, 0x8, 0x732}, r2, 0xe, r0, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)}, 0x44000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/97, 0x61}], 0x1}, 0x3) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x8953, &(0x7f0000000040)=0x2) 18:43:41 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) close(r0) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x7, 0x401, 0xba, 0x0, 0x0, 0x4000, 0x1, 0x7, 0x5, 0xffffffff, 0x4, 0x0, 0x6, 0x1000, 0x3ff, 0x8, 0xffff, 0xefcd, 0x7, 0x5, 0x1, 0x101, 0x10001, 0x3, 0x6, 0x40, 0x9e13, 0x9, 0xfffffffffffffffa, 0x1ed000000000000, 0xfffffffffffffffc, 0x2bd3, 0x7fff, 0x4408, 0xfffffffffffeffff, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x900, 0xfff, 0x7fff, 0x6, 0x80, 0x8, 0x732}, r2, 0xe, r0, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)}, 0x44000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/97, 0x61}], 0x1}, 0x3) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x8953, &(0x7f0000000040)=0x2) 18:43:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="23000000150081ae00002c000500018701546fabca1b4e7d06a6580eebb3556b3d5df5", 0x23}], 0x1}, 0x0) 18:43:42 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) close(r0) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x7, 0x401, 0xba, 0x0, 0x0, 0x4000, 0x1, 0x7, 0x5, 0xffffffff, 0x4, 0x0, 0x6, 0x1000, 0x3ff, 0x8, 0xffff, 0xefcd, 0x7, 0x5, 0x1, 0x101, 0x10001, 0x3, 0x6, 0x40, 0x9e13, 0x9, 0xfffffffffffffffa, 0x1ed000000000000, 0xfffffffffffffffc, 0x2bd3, 0x7fff, 0x4408, 0xfffffffffffeffff, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x900, 0xfff, 0x7fff, 0x6, 0x80, 0x8, 0x732}, r2, 0xe, r0, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)}, 0x44000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/97, 0x61}], 0x1}, 0x3) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x8953, &(0x7f0000000040)=0x2) 18:43:42 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="140000000000f0d4d8e43700f18105005211fd2d1ec5500b16de8972787fbb958f57edf7dd98399c59d073c817c13db2fc7f68e3649cf00e022fa429b6fd6ec85d16dbd4253eb652e37cbecdf24815e0a525f7f7af05d1d499a72a0c770f988b8615cfcce56dcd1fc93201813b2194db166b10690dff2971cb67a8fcbd92353dfd3c9f8f84789b959ded1499960000000009570fb1860f00001a938fd4d7e9a8f22458b459fe0eb025e8b9b1ac24041d9beea795474a5b5d5a2cc490f885d8b48bb1453b85ca2b4ea4"], 0xc9}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000140)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r0, r1, 0x1f, 0x2}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 18:43:42 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) close(r0) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x7, 0x401, 0xba, 0x0, 0x0, 0x4000, 0x1, 0x7, 0x5, 0xffffffff, 0x4, 0x0, 0x6, 0x1000, 0x3ff, 0x8, 0xffff, 0xefcd, 0x7, 0x5, 0x1, 0x101, 0x10001, 0x3, 0x6, 0x40, 0x9e13, 0x9, 0xfffffffffffffffa, 0x1ed000000000000, 0xfffffffffffffffc, 0x2bd3, 0x7fff, 0x4408, 0xfffffffffffeffff, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x900, 0xfff, 0x7fff, 0x6, 0x80, 0x8, 0x732}, r2, 0xe, r0, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)}, 0x44000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/97, 0x61}], 0x1}, 0x3) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x8953, &(0x7f0000000040)=0x2) 18:43:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="23000000150081ae00002c000500018701546fabca1b4e7d06a6580eebb3556b3d5df5", 0x23}], 0x1}, 0x0) [ 328.818672][T19297] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 18:43:42 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) close(r0) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x7, 0x401, 0xba, 0x0, 0x0, 0x4000, 0x1, 0x7, 0x5, 0xffffffff, 0x4, 0x0, 0x6, 0x1000, 0x3ff, 0x8, 0xffff, 0xefcd, 0x7, 0x5, 0x1, 0x101, 0x10001, 0x3, 0x6, 0x40, 0x9e13, 0x9, 0xfffffffffffffffa, 0x1ed000000000000, 0xfffffffffffffffc, 0x2bd3, 0x7fff, 0x4408, 0xfffffffffffeffff, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x900, 0xfff, 0x7fff, 0x6, 0x80, 0x8, 0x732}, r2, 0xe, r0, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)}, 0x44000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/97, 0x61}], 0x1}, 0x3) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x8953, &(0x7f0000000040)=0x2) 18:43:42 executing program 1: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xa3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c) 18:43:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="23000000150081ae00002c000500018701546fabca1b4e7d06a6580eebb3556b3d5df5", 0x23}], 0x1}, 0x0) 18:43:42 executing program 4: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xa3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c) 18:43:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="23000000150081ae00002c000500018701546fabca1b4e7d06a6580eebb3556b3d5df5", 0x23}], 0x1}, 0x0) [ 329.359930][T19322] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 18:43:43 executing program 2: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xa3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c) 18:43:43 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="140000000000f0d4d8e43700f18105005211fd2d1ec5500b16de8972787fbb958f57edf7dd98399c59d073c817c13db2fc7f68e3649cf00e022fa429b6fd6ec85d16dbd4253eb652e37cbecdf24815e0a525f7f7af05d1d499a72a0c770f988b8615cfcce56dcd1fc93201813b2194db166b10690dff2971cb67a8fcbd92353dfd3c9f8f84789b959ded1499960000000009570fb1860f00001a938fd4d7e9a8f22458b459fe0eb025e8b9b1ac24041d9beea795474a5b5d5a2cc490f885d8b48bb1453b85ca2b4ea4"], 0xc9}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000140)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r0, r1, 0x1f, 0x2}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 329.612579][T19336] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 18:43:43 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="140000000000f0d4d8e43700f18105005211fd2d1ec5500b16de8972787fbb958f57edf7dd98399c59d073c817c13db2fc7f68e3649cf00e022fa429b6fd6ec85d16dbd4253eb652e37cbecdf24815e0a525f7f7af05d1d499a72a0c770f988b8615cfcce56dcd1fc93201813b2194db166b10690dff2971cb67a8fcbd92353dfd3c9f8f84789b959ded1499960000000009570fb1860f00001a938fd4d7e9a8f22458b459fe0eb025e8b9b1ac24041d9beea795474a5b5d5a2cc490f885d8b48bb1453b85ca2b4ea4"], 0xc9}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000140)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r0, r1, 0x1f, 0x2}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 18:43:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) close(r0) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x7, 0x401, 0xba, 0x0, 0x0, 0x4000, 0x1, 0x7, 0x5, 0xffffffff, 0x4, 0x0, 0x6, 0x1000, 0x3ff, 0x8, 0xffff, 0xefcd, 0x7, 0x5, 0x1, 0x101, 0x10001, 0x3, 0x6, 0x40, 0x9e13, 0x9, 0xfffffffffffffffa, 0x1ed000000000000, 0xfffffffffffffffc, 0x2bd3, 0x7fff, 0x4408, 0xfffffffffffeffff, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x900, 0xfff, 0x7fff, 0x6, 0x80, 0x8, 0x732}, r2, 0xe, r0, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)}, 0x44000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/97, 0x61}], 0x1}, 0x3) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x8953, &(0x7f0000000040)=0x2) 18:43:43 executing program 2: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xa3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c) [ 330.054145][T19346] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 18:43:43 executing program 4: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xa3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c) 18:43:43 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="140000000000f0d4d8e43700f18105005211fd2d1ec5500b16de8972787fbb958f57edf7dd98399c59d073c817c13db2fc7f68e3649cf00e022fa429b6fd6ec85d16dbd4253eb652e37cbecdf24815e0a525f7f7af05d1d499a72a0c770f988b8615cfcce56dcd1fc93201813b2194db166b10690dff2971cb67a8fcbd92353dfd3c9f8f84789b959ded1499960000000009570fb1860f00001a938fd4d7e9a8f22458b459fe0eb025e8b9b1ac24041d9beea795474a5b5d5a2cc490f885d8b48bb1453b85ca2b4ea4"], 0xc9}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000140)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r0, r1, 0x1f, 0x2}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 18:43:43 executing program 1: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xa3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c) 18:43:44 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="140000000000f0d4d8e43700f18105005211fd2d1ec5500b16de8972787fbb958f57edf7dd98399c59d073c817c13db2fc7f68e3649cf00e022fa429b6fd6ec85d16dbd4253eb652e37cbecdf24815e0a525f7f7af05d1d499a72a0c770f988b8615cfcce56dcd1fc93201813b2194db166b10690dff2971cb67a8fcbd92353dfd3c9f8f84789b959ded1499960000000009570fb1860f00001a938fd4d7e9a8f22458b459fe0eb025e8b9b1ac24041d9beea795474a5b5d5a2cc490f885d8b48bb1453b85ca2b4ea4"], 0xc9}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000140)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r0, r1, 0x1f, 0x2}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 330.501396][T19362] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 18:43:44 executing program 2: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xa3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c) 18:43:44 executing program 5: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xa3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c) 18:43:44 executing program 4: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xa3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c) [ 330.952091][T19369] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 18:43:44 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="140000000000f0d4d8e43700f18105005211fd2d1ec5500b16de8972787fbb958f57edf7dd98399c59d073c817c13db2fc7f68e3649cf00e022fa429b6fd6ec85d16dbd4253eb652e37cbecdf24815e0a525f7f7af05d1d499a72a0c770f988b8615cfcce56dcd1fc93201813b2194db166b10690dff2971cb67a8fcbd92353dfd3c9f8f84789b959ded1499960000000009570fb1860f00001a938fd4d7e9a8f22458b459fe0eb025e8b9b1ac24041d9beea795474a5b5d5a2cc490f885d8b48bb1453b85ca2b4ea4"], 0xc9}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000140)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r0, r1, 0x1f, 0x2}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 18:43:44 executing program 2: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xa3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c) [ 331.409470][T19383] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 18:43:45 executing program 5: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xa3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c) 18:43:45 executing program 1: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xa3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c) 18:43:45 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="140000000000f0d4d8e43700f18105005211fd2d1ec5500b16de8972787fbb958f57edf7dd98399c59d073c817c13db2fc7f68e3649cf00e022fa429b6fd6ec85d16dbd4253eb652e37cbecdf24815e0a525f7f7af05d1d499a72a0c770f988b8615cfcce56dcd1fc93201813b2194db166b10690dff2971cb67a8fcbd92353dfd3c9f8f84789b959ded1499960000000009570fb1860f00001a938fd4d7e9a8f22458b459fe0eb025e8b9b1ac24041d9beea795474a5b5d5a2cc490f885d8b48bb1453b85ca2b4ea4"], 0xc9}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000140)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r0, r1, 0x1f, 0x2}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 18:43:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcc, 0x9}, 0x2c) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f00000000c0)}, 0xffffffffffffffe7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) [ 331.774604][T19399] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 18:43:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcc, 0x9}, 0x2c) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f00000000c0)}, 0xffffffffffffffe7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 18:43:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcc, 0x9}, 0x2c) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f00000000c0)}, 0xffffffffffffffe7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 18:43:45 executing program 2: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xa3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c) 18:43:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcc, 0x9}, 0x2c) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f00000000c0)}, 0xffffffffffffffe7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 18:43:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcc, 0x9}, 0x2c) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f00000000c0)}, 0xffffffffffffffe7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 18:43:46 executing program 5: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xa3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c) 18:43:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcc, 0x9}, 0x2c) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f00000000c0)}, 0xffffffffffffffe7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 18:43:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcc, 0x9}, 0x2c) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f00000000c0)}, 0xffffffffffffffe7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 18:43:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcc, 0x9}, 0x2c) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f00000000c0)}, 0xffffffffffffffe7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 18:43:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcc, 0x9}, 0x2c) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f00000000c0)}, 0xffffffffffffffe7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 18:43:46 executing program 1: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0x30c}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000640)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200), 0x34000}], 0x1}, 0x0) 18:43:46 executing program 2: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xa3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c) 18:43:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100)="0f81c10e2814f0def247c64fb955302c23af35d57a1f95f4493647653fcaac5ce8e403f2d5caa3e54c5f16f31e726f784d0ea837bf2d7a4465879a8c3ae7f137803dffc4f3", 0x0}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000480)='cpuset.effective_cpus\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) socketpair(0x1f, 0x7, 0xad96, 0x0) 18:43:46 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:46 executing program 1: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0x30c}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000640)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200), 0x34000}], 0x1}, 0x0) 18:43:46 executing program 4: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0x30c}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000640)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200), 0x34000}], 0x1}, 0x0) 18:43:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcc, 0x9}, 0x2c) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f00000000c0)}, 0xffffffffffffffe7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 18:43:46 executing program 1: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0x30c}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000640)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200), 0x34000}], 0x1}, 0x0) 18:43:46 executing program 4: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0x30c}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000640)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200), 0x34000}], 0x1}, 0x0) 18:43:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100)="0f81c10e2814f0def247c64fb955302c23af35d57a1f95f4493647653fcaac5ce8e403f2d5caa3e54c5f16f31e726f784d0ea837bf2d7a4465879a8c3ae7f137803dffc4f3", 0x0}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000480)='cpuset.effective_cpus\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) socketpair(0x1f, 0x7, 0xad96, 0x0) 18:43:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100)="0f81c10e2814f0def247c64fb955302c23af35d57a1f95f4493647653fcaac5ce8e403f2d5caa3e54c5f16f31e726f784d0ea837bf2d7a4465879a8c3ae7f137803dffc4f3", 0x0}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000480)='cpuset.effective_cpus\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) socketpair(0x1f, 0x7, 0xad96, 0x0) 18:43:47 executing program 1: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0x30c}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000640)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200), 0x34000}], 0x1}, 0x0) 18:43:47 executing program 4: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0x30c}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000640)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200), 0x34000}], 0x1}, 0x0) 18:43:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100)="0f81c10e2814f0def247c64fb955302c23af35d57a1f95f4493647653fcaac5ce8e403f2d5caa3e54c5f16f31e726f784d0ea837bf2d7a4465879a8c3ae7f137803dffc4f3", 0x0}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000480)='cpuset.effective_cpus\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) socketpair(0x1f, 0x7, 0xad96, 0x0) 18:43:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:47 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100)="0f81c10e2814f0def247c64fb955302c23af35d57a1f95f4493647653fcaac5ce8e403f2d5caa3e54c5f16f31e726f784d0ea837bf2d7a4465879a8c3ae7f137803dffc4f3", 0x0}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000480)='cpuset.effective_cpus\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) socketpair(0x1f, 0x7, 0xad96, 0x0) 18:43:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100)="0f81c10e2814f0def247c64fb955302c23af35d57a1f95f4493647653fcaac5ce8e403f2d5caa3e54c5f16f31e726f784d0ea837bf2d7a4465879a8c3ae7f137803dffc4f3", 0x0}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000480)='cpuset.effective_cpus\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) socketpair(0x1f, 0x7, 0xad96, 0x0) 18:43:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100)="0f81c10e2814f0def247c64fb955302c23af35d57a1f95f4493647653fcaac5ce8e403f2d5caa3e54c5f16f31e726f784d0ea837bf2d7a4465879a8c3ae7f137803dffc4f3", 0x0}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000480)='cpuset.effective_cpus\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) socketpair(0x1f, 0x7, 0xad96, 0x0) 18:43:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100)="0f81c10e2814f0def247c64fb955302c23af35d57a1f95f4493647653fcaac5ce8e403f2d5caa3e54c5f16f31e726f784d0ea837bf2d7a4465879a8c3ae7f137803dffc4f3", 0x0}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000480)='cpuset.effective_cpus\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) socketpair(0x1f, 0x7, 0xad96, 0x0) 18:43:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100)="0f81c10e2814f0def247c64fb955302c23af35d57a1f95f4493647653fcaac5ce8e403f2d5caa3e54c5f16f31e726f784d0ea837bf2d7a4465879a8c3ae7f137803dffc4f3", 0x0}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000480)='cpuset.effective_cpus\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) socketpair(0x1f, 0x7, 0xad96, 0x0) 18:43:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:47 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100)="0f81c10e2814f0def247c64fb955302c23af35d57a1f95f4493647653fcaac5ce8e403f2d5caa3e54c5f16f31e726f784d0ea837bf2d7a4465879a8c3ae7f137803dffc4f3", 0x0}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000480)='cpuset.effective_cpus\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) socketpair(0x1f, 0x7, 0xad96, 0x0) 18:43:47 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:48 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:48 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:48 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:48 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:48 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:48 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:48 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:48 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:48 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:48 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:48 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100)="0f81c10e2814f0def247c64fb955302c23af35d57a1f95f4493647653fcaac5ce8e403f2d5caa3e54c5f16f31e726f784d0ea837bf2d7a4465879a8c3ae7f137803dffc4f3", 0x0}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000480)='cpuset.effective_cpus\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) socketpair(0x1f, 0x7, 0xad96, 0x0) 18:43:49 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100)="0f81c10e2814f0def247c64fb955302c23af35d57a1f95f4493647653fcaac5ce8e403f2d5caa3e54c5f16f31e726f784d0ea837bf2d7a4465879a8c3ae7f137803dffc4f3", 0x0}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000480)='cpuset.effective_cpus\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) socketpair(0x1f, 0x7, 0xad96, 0x0) 18:43:49 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:49 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:49 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0xfffffffeffffffff, 0x3f, 0x9, 0x0, 0x7fffffff, 0x800, 0x5, 0x1f, 0x6, 0x40, 0x9, 0x6, 0xfff, 0x6, 0x4, 0x1, 0x6, 0x3, 0xd6a, 0x101, 0x100, 0xaf, 0x1000, 0x5802f9c0, 0x5, 0x3f, 0x4, 0x1f, 0x0, 0x1, 0xffffffffffff5a5d, 0x2, 0x9, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x1000, 0x8, 0x7fffffff, 0x3, 0x6, 0x100000000, 0x1000}, r2, 0x10, r0, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x3c00) 18:43:49 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100)="0f81c10e2814f0def247c64fb955302c23af35d57a1f95f4493647653fcaac5ce8e403f2d5caa3e54c5f16f31e726f784d0ea837bf2d7a4465879a8c3ae7f137803dffc4f3", 0x0}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000480)='cpuset.effective_cpus\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) socketpair(0x1f, 0x7, 0xad96, 0x0) 18:43:49 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100)="0f81c10e2814f0def247c64fb955302c23af35d57a1f95f4493647653fcaac5ce8e403f2d5caa3e54c5f16f31e726f784d0ea837bf2d7a4465879a8c3ae7f137803dffc4f3", 0x0}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000480)='cpuset.effective_cpus\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) socketpair(0x1f, 0x7, 0xad96, 0x0) 18:43:49 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100)="0f81c10e2814f0def247c64fb955302c23af35d57a1f95f4493647653fcaac5ce8e403f2d5caa3e54c5f16f31e726f784d0ea837bf2d7a4465879a8c3ae7f137803dffc4f3", 0x0}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000480)='cpuset.effective_cpus\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) socketpair(0x1f, 0x7, 0xad96, 0x0) 18:43:49 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0xa, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5) 18:43:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)="2e0000001e000503ed0080647e6394f20100d2000500fc3711157f480f00a4002700000002000000f88000f01700", 0x2e}], 0x1}, 0x0) 18:43:49 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100)="0f81c10e2814f0def247c64fb955302c23af35d57a1f95f4493647653fcaac5ce8e403f2d5caa3e54c5f16f31e726f784d0ea837bf2d7a4465879a8c3ae7f137803dffc4f3", 0x0}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000480)='cpuset.effective_cpus\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) socketpair(0x1f, 0x7, 0xad96, 0x0) 18:43:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000240)="95a228dd281a4cf75dc86fb48abd853b3b6ae3c8deae565fdd87d38eee87432fd4824bf1c5a26bd510508af15f8a7f03eadae48e271fc30c041d5beb9898c43874c0603541388131218aa7a4d4741796778e2a3adbc629d19e49bb8b3fd42be1dc559ab357f6dbfb980cdfb8b9267de752c96e3da572b40c3bf8ff9e46c5de50a34033d4301ff43cd3754b50cda1782fa3c31c08", 0x0}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 18:43:49 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="23000000200081ae00060c00000f000002000000000000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) [ 336.158928][T19585] device nr0 entered promiscuous mode [ 336.237111][T19587] netlink: 'syz-executor.4': attribute type 164 has an invalid length. 18:43:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000240)="95a228dd281a4cf75dc86fb48abd853b3b6ae3c8deae565fdd87d38eee87432fd4824bf1c5a26bd510508af15f8a7f03eadae48e271fc30c041d5beb9898c43874c0603541388131218aa7a4d4741796778e2a3adbc629d19e49bb8b3fd42be1dc559ab357f6dbfb980cdfb8b9267de752c96e3da572b40c3bf8ff9e46c5de50a34033d4301ff43cd3754b50cda1782fa3c31c08", 0x0}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 18:43:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000240)="95a228dd281a4cf75dc86fb48abd853b3b6ae3c8deae565fdd87d38eee87432fd4824bf1c5a26bd510508af15f8a7f03eadae48e271fc30c041d5beb9898c43874c0603541388131218aa7a4d4741796778e2a3adbc629d19e49bb8b3fd42be1dc559ab357f6dbfb980cdfb8b9267de752c96e3da572b40c3bf8ff9e46c5de50a34033d4301ff43cd3754b50cda1782fa3c31c08", 0x0}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 18:43:50 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000240)="95a228dd281a4cf75dc86fb48abd853b3b6ae3c8deae565fdd87d38eee87432fd4824bf1c5a26bd510508af15f8a7f03eadae48e271fc30c041d5beb9898c43874c0603541388131218aa7a4d4741796778e2a3adbc629d19e49bb8b3fd42be1dc559ab357f6dbfb980cdfb8b9267de752c96e3da572b40c3bf8ff9e46c5de50a34033d4301ff43cd3754b50cda1782fa3c31c08", 0x0}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 18:43:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)="2e0000001e000503ed0080647e6394f20100d2000500fc3711157f480f00a4002700000002000000f88000f01700", 0x2e}], 0x1}, 0x0) 18:43:50 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000240)="95a228dd281a4cf75dc86fb48abd853b3b6ae3c8deae565fdd87d38eee87432fd4824bf1c5a26bd510508af15f8a7f03eadae48e271fc30c041d5beb9898c43874c0603541388131218aa7a4d4741796778e2a3adbc629d19e49bb8b3fd42be1dc559ab357f6dbfb980cdfb8b9267de752c96e3da572b40c3bf8ff9e46c5de50a34033d4301ff43cd3754b50cda1782fa3c31c08", 0x0}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 18:43:50 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000240)="95a228dd281a4cf75dc86fb48abd853b3b6ae3c8deae565fdd87d38eee87432fd4824bf1c5a26bd510508af15f8a7f03eadae48e271fc30c041d5beb9898c43874c0603541388131218aa7a4d4741796778e2a3adbc629d19e49bb8b3fd42be1dc559ab357f6dbfb980cdfb8b9267de752c96e3da572b40c3bf8ff9e46c5de50a34033d4301ff43cd3754b50cda1782fa3c31c08", 0x0}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 18:43:50 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000240)="95a228dd281a4cf75dc86fb48abd853b3b6ae3c8deae565fdd87d38eee87432fd4824bf1c5a26bd510508af15f8a7f03eadae48e271fc30c041d5beb9898c43874c0603541388131218aa7a4d4741796778e2a3adbc629d19e49bb8b3fd42be1dc559ab357f6dbfb980cdfb8b9267de752c96e3da572b40c3bf8ff9e46c5de50a34033d4301ff43cd3754b50cda1782fa3c31c08", 0x0}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 336.938063][T19594] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. [ 336.997278][T19611] netlink: 'syz-executor.4': attribute type 164 has an invalid length. [ 337.019034][T19621] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. [ 337.035157][T19585] device nr0 entered promiscuous mode 18:43:50 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0xa, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5) 18:43:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000240)="95a228dd281a4cf75dc86fb48abd853b3b6ae3c8deae565fdd87d38eee87432fd4824bf1c5a26bd510508af15f8a7f03eadae48e271fc30c041d5beb9898c43874c0603541388131218aa7a4d4741796778e2a3adbc629d19e49bb8b3fd42be1dc559ab357f6dbfb980cdfb8b9267de752c96e3da572b40c3bf8ff9e46c5de50a34033d4301ff43cd3754b50cda1782fa3c31c08", 0x0}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 18:43:50 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000240)="95a228dd281a4cf75dc86fb48abd853b3b6ae3c8deae565fdd87d38eee87432fd4824bf1c5a26bd510508af15f8a7f03eadae48e271fc30c041d5beb9898c43874c0603541388131218aa7a4d4741796778e2a3adbc629d19e49bb8b3fd42be1dc559ab357f6dbfb980cdfb8b9267de752c96e3da572b40c3bf8ff9e46c5de50a34033d4301ff43cd3754b50cda1782fa3c31c08", 0x0}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 18:43:50 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\x00;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddpr\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) close(r1) r2 = socket$kcm(0xa, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) recvmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/134, 0x10}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 18:43:50 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="23000000200081ae00060c00000f000002000000000000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 18:43:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)="2e0000001e000503ed0080647e6394f20100d2000500fc3711157f480f00a4002700000002000000f88000f01700", 0x2e}], 0x1}, 0x0) [ 337.294589][T19633] netlink: 'syz-executor.4': attribute type 164 has an invalid length. [ 337.318045][T19632] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. 18:43:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)="2e0000001e000503ed0080647e6394f20100d2000500fc3711157f480f00a4002700000002000000f88000f01700", 0x2e}], 0x1}, 0x0) 18:43:51 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0xa, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5) 18:43:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000240)="95a228dd281a4cf75dc86fb48abd853b3b6ae3c8deae565fdd87d38eee87432fd4824bf1c5a26bd510508af15f8a7f03eadae48e271fc30c041d5beb9898c43874c0603541388131218aa7a4d4741796778e2a3adbc629d19e49bb8b3fd42be1dc559ab357f6dbfb980cdfb8b9267de752c96e3da572b40c3bf8ff9e46c5de50a34033d4301ff43cd3754b50cda1782fa3c31c08", 0x0}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 18:43:51 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\x00;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddpr\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) close(r1) r2 = socket$kcm(0xa, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) recvmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/134, 0x10}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 18:43:51 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="23000000200081ae00060c00000f000002000000000000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) [ 337.467687][T19639] device nr0 entered promiscuous mode [ 337.542418][T19649] netlink: 'syz-executor.4': attribute type 164 has an invalid length. 18:43:51 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\x00;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddpr\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) close(r1) r2 = socket$kcm(0xa, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) recvmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/134, 0x10}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 337.634187][T19656] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. [ 337.983309][T19657] device nr0 entered promiscuous mode 18:43:51 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\x00;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddpr\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) close(r1) r2 = socket$kcm(0xa, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) recvmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/134, 0x10}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 18:43:51 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0xa, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5) 18:43:51 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="23000000200081ae00060c00000f000002000000000000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 18:43:51 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) 18:43:51 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\x00;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddpr\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) close(r1) r2 = socket$kcm(0xa, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) recvmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/134, 0x10}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 18:43:51 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0xa, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5) [ 338.166586][T19674] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. 18:43:51 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\x00;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddpr\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) close(r1) r2 = socket$kcm(0xa, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) recvmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/134, 0x10}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 18:43:51 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\x00;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddpr\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) close(r1) r2 = socket$kcm(0xa, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) recvmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/134, 0x10}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 18:43:51 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='sy\xca\xf0\xf0\xc6\x9b\xc5K\xf5', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(r0, 0x1, 0x14, &(0x7f0000000080), 0x2cb) [ 338.378167][T19679] device nr0 entered promiscuous mode [ 338.455358][T19680] device nr0 entered promiscuous mode [ 338.500840][T19691] sock: sock_set_timeout: `syz-executor.5' (pid 19691) tries to set negative timeout 18:43:52 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x40000000a, 0x3, 0x800, 0x100000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x2}, 0x2c) 18:43:52 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='sy\xca\xf0\xf0\xc6\x9b\xc5K\xf5', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(r0, 0x1, 0x14, &(0x7f0000000080), 0x2cb) [ 338.575026][T19693] sock: sock_set_timeout: `syz-executor.5' (pid 19693) tries to set negative timeout 18:43:52 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x80000001, 0x0, 0x0, 0xffffffffffffff9c, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x0, 0x0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000000)={0x1, 0x3, [@random="9ae4d53a4cc0", @broadcast, @local]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000740)={r2, &(0x7f0000000700)="b473e1c481c1af7b0a7b7538e508a0f5051c62d7816a6bb5ecfe2621dceabdd3e293", 0x0}, 0x18) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000540)="a15966d53faea75f4d9d3acfff033c6739dbef686331f4b61a8e51f60471ee7cb503fc155e2801bc3cc783d15cd3b55381cda9bf34110fd183a48da0d70875bca15407753d3af3313713ae956be4d5fad8133dee7a00681133fbaae69c7dc8554c86e4cf0ba34b1438f7880cc7d73597923fd522bb3fbc59c3d6a062b9", 0x7d}], 0x1}, 0x24004080) close(r3) unlink(&(0x7f0000000400)='./file1\x00') socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) [ 338.732359][T19699] sock: sock_set_timeout: `syz-executor.5' (pid 19699) tries to set negative timeout 18:43:52 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='sy\xca\xf0\xf0\xc6\x9b\xc5K\xf5', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(r0, 0x1, 0x14, &(0x7f0000000080), 0x2cb) [ 338.919774][T19708] sock: sock_set_timeout: `syz-executor.5' (pid 19708) tries to set negative timeout [ 339.226322][T19709] device nr0 entered promiscuous mode [ 339.235827][T19705] device nr0 left promiscuous mode 18:43:52 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0xa, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5) 18:43:52 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x40000000a, 0x3, 0x800, 0x100000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x2}, 0x2c) 18:43:52 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) 18:43:52 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='sy\xca\xf0\xf0\xc6\x9b\xc5K\xf5', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(r0, 0x1, 0x14, &(0x7f0000000080), 0x2cb) 18:43:52 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0xa, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5) [ 339.381370][T19725] sock: sock_set_timeout: `syz-executor.5' (pid 19725) tries to set negative timeout 18:43:53 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x40000000a, 0x3, 0x800, 0x100000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x2}, 0x2c) 18:43:53 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) 18:43:53 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x40000000a, 0x3, 0x800, 0x100000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x2}, 0x2c) [ 339.762926][T19705] device nr0 entered promiscuous mode [ 339.787110][T19731] device nr0 entered promiscuous mode 18:43:53 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) 18:43:53 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) [ 340.313513][T19732] device nr0 entered promiscuous mode 18:43:54 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x80000001, 0x0, 0x0, 0xffffffffffffff9c, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x0, 0x0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000000)={0x1, 0x3, [@random="9ae4d53a4cc0", @broadcast, @local]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000740)={r2, &(0x7f0000000700)="b473e1c481c1af7b0a7b7538e508a0f5051c62d7816a6bb5ecfe2621dceabdd3e293", 0x0}, 0x18) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000540)="a15966d53faea75f4d9d3acfff033c6739dbef686331f4b61a8e51f60471ee7cb503fc155e2801bc3cc783d15cd3b55381cda9bf34110fd183a48da0d70875bca15407753d3af3313713ae956be4d5fad8133dee7a00681133fbaae69c7dc8554c86e4cf0ba34b1438f7880cc7d73597923fd522bb3fbc59c3d6a062b9", 0x7d}], 0x1}, 0x24004080) close(r3) unlink(&(0x7f0000000400)='./file1\x00') socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 18:43:54 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) [ 340.909104][T19765] device nr0 entered promiscuous mode [ 340.932411][T19769] device nr0 left promiscuous mode 18:43:54 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x80000001, 0x0, 0x0, 0xffffffffffffff9c, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x0, 0x0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000000)={0x1, 0x3, [@random="9ae4d53a4cc0", @broadcast, @local]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000740)={r2, &(0x7f0000000700)="b473e1c481c1af7b0a7b7538e508a0f5051c62d7816a6bb5ecfe2621dceabdd3e293", 0x0}, 0x18) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000540)="a15966d53faea75f4d9d3acfff033c6739dbef686331f4b61a8e51f60471ee7cb503fc155e2801bc3cc783d15cd3b55381cda9bf34110fd183a48da0d70875bca15407753d3af3313713ae956be4d5fad8133dee7a00681133fbaae69c7dc8554c86e4cf0ba34b1438f7880cc7d73597923fd522bb3fbc59c3d6a062b9", 0x7d}], 0x1}, 0x24004080) close(r3) unlink(&(0x7f0000000400)='./file1\x00') socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 18:43:54 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) 18:43:54 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x80000001, 0x0, 0x0, 0xffffffffffffff9c, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x0, 0x0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000000)={0x1, 0x3, [@random="9ae4d53a4cc0", @broadcast, @local]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000740)={r2, &(0x7f0000000700)="b473e1c481c1af7b0a7b7538e508a0f5051c62d7816a6bb5ecfe2621dceabdd3e293", 0x0}, 0x18) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000540)="a15966d53faea75f4d9d3acfff033c6739dbef686331f4b61a8e51f60471ee7cb503fc155e2801bc3cc783d15cd3b55381cda9bf34110fd183a48da0d70875bca15407753d3af3313713ae956be4d5fad8133dee7a00681133fbaae69c7dc8554c86e4cf0ba34b1438f7880cc7d73597923fd522bb3fbc59c3d6a062b9", 0x7d}], 0x1}, 0x24004080) close(r3) unlink(&(0x7f0000000400)='./file1\x00') socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 18:43:54 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) 18:43:54 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) [ 341.516608][T19788] device nr0 entered promiscuous mode 18:43:55 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) 18:43:55 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) 18:43:55 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) [ 342.086379][T19784] device nr0 entered promiscuous mode 18:43:55 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x80000001, 0x0, 0x0, 0xffffffffffffff9c, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x0, 0x0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000000)={0x1, 0x3, [@random="9ae4d53a4cc0", @broadcast, @local]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000740)={r2, &(0x7f0000000700)="b473e1c481c1af7b0a7b7538e508a0f5051c62d7816a6bb5ecfe2621dceabdd3e293", 0x0}, 0x18) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000540)="a15966d53faea75f4d9d3acfff033c6739dbef686331f4b61a8e51f60471ee7cb503fc155e2801bc3cc783d15cd3b55381cda9bf34110fd183a48da0d70875bca15407753d3af3313713ae956be4d5fad8133dee7a00681133fbaae69c7dc8554c86e4cf0ba34b1438f7880cc7d73597923fd522bb3fbc59c3d6a062b9", 0x7d}], 0x1}, 0x24004080) close(r3) unlink(&(0x7f0000000400)='./file1\x00') socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) [ 342.127732][T19787] device nr0 left promiscuous mode 18:43:55 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) 18:43:56 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) [ 342.523251][T19777] device nr0 left promiscuous mode 18:43:56 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) [ 342.989100][T19822] device nr0 entered promiscuous mode [ 342.997730][T19826] device nr0 left promiscuous mode 18:43:56 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x80000001, 0x0, 0x0, 0xffffffffffffff9c, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x0, 0x0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000000)={0x1, 0x3, [@random="9ae4d53a4cc0", @broadcast, @local]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000740)={r2, &(0x7f0000000700)="b473e1c481c1af7b0a7b7538e508a0f5051c62d7816a6bb5ecfe2621dceabdd3e293", 0x0}, 0x18) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000540)="a15966d53faea75f4d9d3acfff033c6739dbef686331f4b61a8e51f60471ee7cb503fc155e2801bc3cc783d15cd3b55381cda9bf34110fd183a48da0d70875bca15407753d3af3313713ae956be4d5fad8133dee7a00681133fbaae69c7dc8554c86e4cf0ba34b1438f7880cc7d73597923fd522bb3fbc59c3d6a062b9", 0x7d}], 0x1}, 0x24004080) close(r3) unlink(&(0x7f0000000400)='./file1\x00') socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 18:43:56 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) 18:43:56 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x80000001, 0x0, 0x0, 0xffffffffffffff9c, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x0, 0x0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000000)={0x1, 0x3, [@random="9ae4d53a4cc0", @broadcast, @local]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000740)={r2, &(0x7f0000000700)="b473e1c481c1af7b0a7b7538e508a0f5051c62d7816a6bb5ecfe2621dceabdd3e293", 0x0}, 0x18) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000540)="a15966d53faea75f4d9d3acfff033c6739dbef686331f4b61a8e51f60471ee7cb503fc155e2801bc3cc783d15cd3b55381cda9bf34110fd183a48da0d70875bca15407753d3af3313713ae956be4d5fad8133dee7a00681133fbaae69c7dc8554c86e4cf0ba34b1438f7880cc7d73597923fd522bb3fbc59c3d6a062b9", 0x7d}], 0x1}, 0x24004080) close(r3) unlink(&(0x7f0000000400)='./file1\x00') socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 18:43:56 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) 18:43:56 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) 18:43:57 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x80000001, 0x0, 0x0, 0xffffffffffffff9c, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x0, 0x0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000000)={0x1, 0x3, [@random="9ae4d53a4cc0", @broadcast, @local]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000740)={r2, &(0x7f0000000700)="b473e1c481c1af7b0a7b7538e508a0f5051c62d7816a6bb5ecfe2621dceabdd3e293", 0x0}, 0x18) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000540)="a15966d53faea75f4d9d3acfff033c6739dbef686331f4b61a8e51f60471ee7cb503fc155e2801bc3cc783d15cd3b55381cda9bf34110fd183a48da0d70875bca15407753d3af3313713ae956be4d5fad8133dee7a00681133fbaae69c7dc8554c86e4cf0ba34b1438f7880cc7d73597923fd522bb3fbc59c3d6a062b9", 0x7d}], 0x1}, 0x24004080) close(r3) unlink(&(0x7f0000000400)='./file1\x00') socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 18:43:57 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) 18:43:57 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) 18:43:57 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x40000000a, 0x3, 0x800, 0x100000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x2}, 0x2c) [ 343.987810][T19847] device nr0 entered promiscuous mode [ 344.044704][T19849] device nr0 left promiscuous mode 18:43:57 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x40000000a, 0x3, 0x800, 0x100000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x2}, 0x2c) 18:43:57 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x40000000a, 0x3, 0x800, 0x100000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x2}, 0x2c) 18:43:58 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socket$kcm(0xa, 0x40122000000002, 0x11) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000640)={0x0, 0xfffffffffffffde9, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000f00)=@can, 0x80, 0x0, 0x0, &(0x7f0000000fc0)=""/230, 0xe6}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000200)=""/11, 0x0, 0xb}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffff9c, 0x10, &(0x7f0000000300)={&(0x7f0000000980)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) close(r1) [ 344.613570][T19848] device nr0 entered promiscuous mode [ 344.635021][T19851] device nr0 left promiscuous mode [ 344.785842][T19867] device nr0 entered promiscuous mode [ 344.796331][T19869] device nr0 left promiscuous mode 18:43:58 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x80000001, 0x0, 0x0, 0xffffffffffffff9c, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x0, 0x0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000000)={0x1, 0x3, [@random="9ae4d53a4cc0", @broadcast, @local]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000740)={r2, &(0x7f0000000700)="b473e1c481c1af7b0a7b7538e508a0f5051c62d7816a6bb5ecfe2621dceabdd3e293", 0x0}, 0x18) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000540)="a15966d53faea75f4d9d3acfff033c6739dbef686331f4b61a8e51f60471ee7cb503fc155e2801bc3cc783d15cd3b55381cda9bf34110fd183a48da0d70875bca15407753d3af3313713ae956be4d5fad8133dee7a00681133fbaae69c7dc8554c86e4cf0ba34b1438f7880cc7d73597923fd522bb3fbc59c3d6a062b9", 0x7d}], 0x1}, 0x24004080) close(r3) unlink(&(0x7f0000000400)='./file1\x00') socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 18:43:58 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) 18:43:58 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x80000001, 0x0, 0x0, 0xffffffffffffff9c, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x0, 0x0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000000)={0x1, 0x3, [@random="9ae4d53a4cc0", @broadcast, @local]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000740)={r2, &(0x7f0000000700)="b473e1c481c1af7b0a7b7538e508a0f5051c62d7816a6bb5ecfe2621dceabdd3e293", 0x0}, 0x18) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000540)="a15966d53faea75f4d9d3acfff033c6739dbef686331f4b61a8e51f60471ee7cb503fc155e2801bc3cc783d15cd3b55381cda9bf34110fd183a48da0d70875bca15407753d3af3313713ae956be4d5fad8133dee7a00681133fbaae69c7dc8554c86e4cf0ba34b1438f7880cc7d73597923fd522bb3fbc59c3d6a062b9", 0x7d}], 0x1}, 0x24004080) close(r3) unlink(&(0x7f0000000400)='./file1\x00') socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 18:43:58 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net//..\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000002a00810600000000000000cf0200b0eba0b4d65cdbaa18b29c473da67e3d743098cbb3001be63e75c80b", 0x2e}], 0x1}, 0x0) 18:43:58 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socket$kcm(0xa, 0x40122000000002, 0x11) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000640)={0x0, 0xfffffffffffffde9, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000f00)=@can, 0x80, 0x0, 0x0, &(0x7f0000000fc0)=""/230, 0xe6}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000200)=""/11, 0x0, 0xb}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffff9c, 0x10, &(0x7f0000000300)={&(0x7f0000000980)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) close(r1) 18:43:58 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socket$kcm(0xa, 0x40122000000002, 0x11) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000640)={0x0, 0xfffffffffffffde9, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000f00)=@can, 0x80, 0x0, 0x0, &(0x7f0000000fc0)=""/230, 0xe6}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000200)=""/11, 0x0, 0xb}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffff9c, 0x10, &(0x7f0000000300)={&(0x7f0000000980)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) close(r1) [ 345.199659][T19911] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 18:43:58 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r1, 0x0, 0x10120) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2a6, 0x91fc, 0x5, 0x2, 0x0, 0x4, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x5, 0x4, 0x1, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x8f2, 0x2, 0x1}, r6, 0x2, r4, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a61a90057c9bf", 0x0, 0x401}, 0x28) close(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000340), 0x12) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0xf}, 0x10) 18:43:59 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net//..\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000002a00810600000000000000cf0200b0eba0b4d65cdbaa18b29c473da67e3d743098cbb3001be63e75c80b", 0x2e}], 0x1}, 0x0) 18:43:59 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socket$kcm(0xa, 0x40122000000002, 0x11) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000640)={0x0, 0xfffffffffffffde9, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000f00)=@can, 0x80, 0x0, 0x0, &(0x7f0000000fc0)=""/230, 0xe6}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000200)=""/11, 0x0, 0xb}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffff9c, 0x10, &(0x7f0000000300)={&(0x7f0000000980)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) close(r1) [ 345.469495][T19920] device nr0 entered promiscuous mode [ 345.629376][T19907] device nr0 left promiscuous mode [ 345.650793][T19936] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 18:43:59 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net//..\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000002a00810600000000000000cf0200b0eba0b4d65cdbaa18b29c473da67e3d743098cbb3001be63e75c80b", 0x2e}], 0x1}, 0x0) [ 345.999474][T19946] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 18:43:59 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socket$kcm(0xa, 0x40122000000002, 0x11) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000640)={0x0, 0xfffffffffffffde9, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000f00)=@can, 0x80, 0x0, 0x0, &(0x7f0000000fc0)=""/230, 0xe6}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000200)=""/11, 0x0, 0xb}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffff9c, 0x10, &(0x7f0000000300)={&(0x7f0000000980)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) close(r1) 18:43:59 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net//..\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000002a00810600000000000000cf0200b0eba0b4d65cdbaa18b29c473da67e3d743098cbb3001be63e75c80b", 0x2e}], 0x1}, 0x0) [ 346.193044][T19952] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 346.408597][T19929] device nr0 entered promiscuous mode 18:44:00 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socket$kcm(0xa, 0x40122000000002, 0x11) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000640)={0x0, 0xfffffffffffffde9, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000f00)=@can, 0x80, 0x0, 0x0, &(0x7f0000000fc0)=""/230, 0xe6}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000200)=""/11, 0x0, 0xb}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffff9c, 0x10, &(0x7f0000000300)={&(0x7f0000000980)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) close(r1) 18:44:00 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net//..\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000002a00810600000000000000cf0200b0eba0b4d65cdbaa18b29c473da67e3d743098cbb3001be63e75c80b", 0x2e}], 0x1}, 0x0) 18:44:00 executing program 1: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000480)="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", 0xfb}], 0x1}, 0x0) 18:44:00 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net//..\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000002a00810600000000000000cf0200b0eba0b4d65cdbaa18b29c473da67e3d743098cbb3001be63e75c80b", 0x2e}], 0x1}, 0x0) 18:44:00 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socket$kcm(0xa, 0x40122000000002, 0x11) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000640)={0x0, 0xfffffffffffffde9, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000f00)=@can, 0x80, 0x0, 0x0, &(0x7f0000000fc0)=""/230, 0xe6}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000200)=""/11, 0x0, 0xb}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffff9c, 0x10, &(0x7f0000000300)={&(0x7f0000000980)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) close(r1) 18:44:00 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='/\x02ro\x05\x00\x00\x00tap\x00\x89PY7/\x91\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1\xf8\x1d\xb6,\xc99\x96h\xf3\x01\xb3f\x8a\xd0+G\xddC\x9d\xcfE?\x1b\xce\xff;OZ\'E\xf5', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000000) [ 346.734056][T19963] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 346.793663][T19965] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 346.840144][T19972] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.1'. 18:44:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:00 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net//..\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000002a00810600000000000000cf0200b0eba0b4d65cdbaa18b29c473da67e3d743098cbb3001be63e75c80b", 0x2e}], 0x1}, 0x0) 18:44:00 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='/\x02ro\x05\x00\x00\x00tap\x00\x89PY7/\x91\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1\xf8\x1d\xb6,\xc99\x96h\xf3\x01\xb3f\x8a\xd0+G\xddC\x9d\xcfE?\x1b\xce\xff;OZ\'E\xf5', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000000) 18:44:00 executing program 1: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000480)="fb00000024000102bfa9d345e7eb8dfe204ee2d70800000000000100f1ffe3fb3a2f266d905d1ee3642cd2c61dffff801d5291d76b8c674521ee9f2860fa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea7913e592c6d03136f2f0fbc0d13c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e7aab6489978112322628c7a1fbab650cdc797d32d3524ea85b198cb44a83c011d2572f9291431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a86105ea0ddbad539ef278168ac8d157a6366ccec93f9fb8f100437172ff0700000000", 0xfb}], 0x1}, 0x0) [ 347.094289][T19986] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 18:44:00 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='/\x02ro\x05\x00\x00\x00tap\x00\x89PY7/\x91\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1\xf8\x1d\xb6,\xc99\x96h\xf3\x01\xb3f\x8a\xd0+G\xddC\x9d\xcfE?\x1b\xce\xff;OZ\'E\xf5', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000000) 18:44:00 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socket$kcm(0xa, 0x40122000000002, 0x11) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000640)={0x0, 0xfffffffffffffde9, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000f00)=@can, 0x80, 0x0, 0x0, &(0x7f0000000fc0)=""/230, 0xe6}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000200)=""/11, 0x0, 0xb}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffff9c, 0x10, &(0x7f0000000300)={&(0x7f0000000980)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) close(r1) [ 347.219406][T19990] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.1'. 18:44:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x54}}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfc76, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000040)}, 0x48) 18:44:00 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socket$kcm(0xa, 0x40122000000002, 0x11) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000640)={0x0, 0xfffffffffffffde9, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000f00)=@can, 0x80, 0x0, 0x0, &(0x7f0000000fc0)=""/230, 0xe6}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000200)=""/11, 0x0, 0xb}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffff9c, 0x10, &(0x7f0000000300)={&(0x7f0000000980)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) close(r1) 18:44:00 executing program 1: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000480)="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", 0xfb}], 0x1}, 0x0) 18:44:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x54}}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfc76, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000040)}, 0x48) 18:44:01 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='/\x02ro\x05\x00\x00\x00tap\x00\x89PY7/\x91\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1\xf8\x1d\xb6,\xc99\x96h\xf3\x01\xb3f\x8a\xd0+G\xddC\x9d\xcfE?\x1b\xce\xff;OZ\'E\xf5', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000000) [ 347.539040][T20005] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.1'. 18:44:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:01 executing program 1: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000480)="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", 0xfb}], 0x1}, 0x0) 18:44:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x54}}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfc76, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000040)}, 0x48) 18:44:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:01 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socket$kcm(0xa, 0x40122000000002, 0x11) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000640)={0x0, 0xfffffffffffffde9, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000f00)=@can, 0x80, 0x0, 0x0, &(0x7f0000000fc0)=""/230, 0xe6}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000200)=""/11, 0x0, 0xb}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffff9c, 0x10, &(0x7f0000000300)={&(0x7f0000000980)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) close(r1) 18:44:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x54}}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfc76, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000040)}, 0x48) 18:44:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:05 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)="579934592362c768d71111161aa226cb6d89b0d2acddcd4d18822246baf01ff49965b30560e16e07a4c5b25e74997c161467eb2f5f10fdd5550b78dfefdc2b38ed58c90c4858d06546582c0eccdcefccefc34e7e36eaf5225fe30045288499c0ab762409f8d1defcb268e1d0ce14edb751ae04fc1df4bcf849c2b1a537126976a37b258c10210fb617b83b940d915f7c4179cf427b7f3e2ec8b3365539125d431b11ecabe2c94e4c6e01f9b6ec8caff07407e60648476cf0e5", 0xb9}], 0x1}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r2, r3}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$kcm(0x10, 0x2000000000001, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) [ 351.593120][T20134] __nla_validate_parse: 1 callbacks suppressed [ 351.593185][T20134] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 18:44:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:05 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x800000000000003, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8902, 0x2070a000) 18:44:05 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x800000000000003, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8902, 0x2070a000) [ 352.111403][T20134] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 18:44:05 executing program 5: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0, 0x8}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 18:44:05 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)="579934592362c768d71111161aa226cb6d89b0d2acddcd4d18822246baf01ff49965b30560e16e07a4c5b25e74997c161467eb2f5f10fdd5550b78dfefdc2b38ed58c90c4858d06546582c0eccdcefccefc34e7e36eaf5225fe30045288499c0ab762409f8d1defcb268e1d0ce14edb751ae04fc1df4bcf849c2b1a537126976a37b258c10210fb617b83b940d915f7c4179cf427b7f3e2ec8b3365539125d431b11ecabe2c94e4c6e01f9b6ec8caff07407e60648476cf0e5", 0xb9}], 0x1}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r2, r3}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$kcm(0x10, 0x2000000000001, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) 18:44:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:06 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x800000000000003, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8902, 0x2070a000) [ 352.622512][T20160] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 18:44:06 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x800000000000003, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8902, 0x2070a000) 18:44:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 18:44:06 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)="579934592362c768d71111161aa226cb6d89b0d2acddcd4d18822246baf01ff49965b30560e16e07a4c5b25e74997c161467eb2f5f10fdd5550b78dfefdc2b38ed58c90c4858d06546582c0eccdcefccefc34e7e36eaf5225fe30045288499c0ab762409f8d1defcb268e1d0ce14edb751ae04fc1df4bcf849c2b1a537126976a37b258c10210fb617b83b940d915f7c4179cf427b7f3e2ec8b3365539125d431b11ecabe2c94e4c6e01f9b6ec8caff07407e60648476cf0e5", 0xb9}], 0x1}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r2, r3}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$kcm(0x10, 0x2000000000001, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) 18:44:06 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)="579934592362c768d71111161aa226cb6d89b0d2acddcd4d18822246baf01ff49965b30560e16e07a4c5b25e74997c161467eb2f5f10fdd5550b78dfefdc2b38ed58c90c4858d06546582c0eccdcefccefc34e7e36eaf5225fe30045288499c0ab762409f8d1defcb268e1d0ce14edb751ae04fc1df4bcf849c2b1a537126976a37b258c10210fb617b83b940d915f7c4179cf427b7f3e2ec8b3365539125d431b11ecabe2c94e4c6e01f9b6ec8caff07407e60648476cf0e5", 0xb9}], 0x1}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r2, r3}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$kcm(0x10, 0x2000000000001, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) 18:44:06 executing program 5: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0, 0x8}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) [ 353.224896][T20190] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 18:44:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x7, 0xfffffffffffffe00}]}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) r4 = getpid() write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="b32e07e2a35a4420f7043f010000000000000000000000f4f59f98e4000000000000000000000000bc84800053491437a2c61f1424df9299d7b1bbfeaac6b8bf"], 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000400)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x11, 0xd9, 0x9, 0x7ff, 0x0, 0x56, 0x80, 0x5, 0x100, 0x1, 0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7, 0x0, 0x0, 0x200, 0xd651, 0x0, 0x8, 0x5, 0x6, 0x5, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x8, 0x8000, 0x6, 0x5, 0x7, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x126, 0xf5}, 0x1000, 0x0, 0x0, 0xf, 0x0, 0x7}, r4, 0x8, r5, 0x1) recvmsg(r2, 0x0, 0x12000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000020"], 0x7) perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x2, 0x7fff, 0xb, 0x3, 0x0, 0x6, 0x10, 0x6, 0x10001, 0x6, 0x7ff, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x0, 0x7, 0xc06, 0x20000, 0x98, 0x6, 0x6, 0x3, 0x8, 0x2, 0x0, 0x8, 0x80000001, 0x0, 0x9, 0x80000000, 0x6, 0x8e, 0x0, 0x8, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x10, 0xfffffffff8a43564, 0x401, 0x1, 0x4, 0x2, 0x40}, r5, 0x9, r3, 0x8) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) [ 353.662024][T20194] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 18:44:07 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)="579934592362c768d71111161aa226cb6d89b0d2acddcd4d18822246baf01ff49965b30560e16e07a4c5b25e74997c161467eb2f5f10fdd5550b78dfefdc2b38ed58c90c4858d06546582c0eccdcefccefc34e7e36eaf5225fe30045288499c0ab762409f8d1defcb268e1d0ce14edb751ae04fc1df4bcf849c2b1a537126976a37b258c10210fb617b83b940d915f7c4179cf427b7f3e2ec8b3365539125d431b11ecabe2c94e4c6e01f9b6ec8caff07407e60648476cf0e5", 0xb9}], 0x1}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r2, r3}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$kcm(0x10, 0x2000000000001, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) 18:44:07 executing program 4: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0, 0x8}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 18:44:07 executing program 1: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0, 0x8}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) [ 354.098968][T20209] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 18:44:07 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)="579934592362c768d71111161aa226cb6d89b0d2acddcd4d18822246baf01ff49965b30560e16e07a4c5b25e74997c161467eb2f5f10fdd5550b78dfefdc2b38ed58c90c4858d06546582c0eccdcefccefc34e7e36eaf5225fe30045288499c0ab762409f8d1defcb268e1d0ce14edb751ae04fc1df4bcf849c2b1a537126976a37b258c10210fb617b83b940d915f7c4179cf427b7f3e2ec8b3365539125d431b11ecabe2c94e4c6e01f9b6ec8caff07407e60648476cf0e5", 0xb9}], 0x1}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r2, r3}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$kcm(0x10, 0x2000000000001, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) 18:44:07 executing program 5: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0, 0x8}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 18:44:08 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)="579934592362c768d71111161aa226cb6d89b0d2acddcd4d18822246baf01ff49965b30560e16e07a4c5b25e74997c161467eb2f5f10fdd5550b78dfefdc2b38ed58c90c4858d06546582c0eccdcefccefc34e7e36eaf5225fe30045288499c0ab762409f8d1defcb268e1d0ce14edb751ae04fc1df4bcf849c2b1a537126976a37b258c10210fb617b83b940d915f7c4179cf427b7f3e2ec8b3365539125d431b11ecabe2c94e4c6e01f9b6ec8caff07407e60648476cf0e5", 0xb9}], 0x1}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r2, r3}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$kcm(0x10, 0x2000000000001, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) [ 354.533839][T20221] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 18:44:08 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)="579934592362c768d71111161aa226cb6d89b0d2acddcd4d18822246baf01ff49965b30560e16e07a4c5b25e74997c161467eb2f5f10fdd5550b78dfefdc2b38ed58c90c4858d06546582c0eccdcefccefc34e7e36eaf5225fe30045288499c0ab762409f8d1defcb268e1d0ce14edb751ae04fc1df4bcf849c2b1a537126976a37b258c10210fb617b83b940d915f7c4179cf427b7f3e2ec8b3365539125d431b11ecabe2c94e4c6e01f9b6ec8caff07407e60648476cf0e5", 0xb9}], 0x1}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r2, r3}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$kcm(0x10, 0x2000000000001, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) [ 354.728904][T20228] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 18:44:08 executing program 4: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0, 0x8}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 18:44:08 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)="579934592362c768d71111161aa226cb6d89b0d2acddcd4d18822246baf01ff49965b30560e16e07a4c5b25e74997c161467eb2f5f10fdd5550b78dfefdc2b38ed58c90c4858d06546582c0eccdcefccefc34e7e36eaf5225fe30045288499c0ab762409f8d1defcb268e1d0ce14edb751ae04fc1df4bcf849c2b1a537126976a37b258c10210fb617b83b940d915f7c4179cf427b7f3e2ec8b3365539125d431b11ecabe2c94e4c6e01f9b6ec8caff07407e60648476cf0e5", 0xb9}], 0x1}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r2, r3}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$kcm(0x10, 0x2000000000001, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) [ 354.988990][T20234] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 18:44:08 executing program 1: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0, 0x8}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 18:44:08 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)="579934592362c768d71111161aa226cb6d89b0d2acddcd4d18822246baf01ff49965b30560e16e07a4c5b25e74997c161467eb2f5f10fdd5550b78dfefdc2b38ed58c90c4858d06546582c0eccdcefccefc34e7e36eaf5225fe30045288499c0ab762409f8d1defcb268e1d0ce14edb751ae04fc1df4bcf849c2b1a537126976a37b258c10210fb617b83b940d915f7c4179cf427b7f3e2ec8b3365539125d431b11ecabe2c94e4c6e01f9b6ec8caff07407e60648476cf0e5", 0xb9}], 0x1}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r2, r3}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$kcm(0x10, 0x2000000000001, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) 18:44:08 executing program 5: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0, 0x8}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) [ 355.288469][T20242] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 18:44:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x10e, 0xa, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="2e000000110081c5e43230ecdb4cb9040a485eb8be9294f9f25324f0758ef9000600b0eba06ac40006000300f9ff", 0x2e}], 0x1, &(0x7f0000000200)}, 0x0) 18:44:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x10e, 0xa, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="2e000000110081c5e43230ecdb4cb9040a485eb8be9294f9f25324f0758ef9000600b0eba06ac40006000300f9ff", 0x2e}], 0x1, &(0x7f0000000200)}, 0x0) 18:44:09 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)="579934592362c768d71111161aa226cb6d89b0d2acddcd4d18822246baf01ff49965b30560e16e07a4c5b25e74997c161467eb2f5f10fdd5550b78dfefdc2b38ed58c90c4858d06546582c0eccdcefccefc34e7e36eaf5225fe30045288499c0ab762409f8d1defcb268e1d0ce14edb751ae04fc1df4bcf849c2b1a537126976a37b258c10210fb617b83b940d915f7c4179cf427b7f3e2ec8b3365539125d431b11ecabe2c94e4c6e01f9b6ec8caff07407e60648476cf0e5", 0xb9}], 0x1}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r2, r3}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$kcm(0x10, 0x2000000000001, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) 18:44:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x10e, 0xa, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="2e000000110081c5e43230ecdb4cb9040a485eb8be9294f9f25324f0758ef9000600b0eba06ac40006000300f9ff", 0x2e}], 0x1, &(0x7f0000000200)}, 0x0) 18:44:09 executing program 4: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0, 0x8}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 18:44:09 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)="579934592362c768d71111161aa226cb6d89b0d2acddcd4d18822246baf01ff49965b30560e16e07a4c5b25e74997c161467eb2f5f10fdd5550b78dfefdc2b38ed58c90c4858d06546582c0eccdcefccefc34e7e36eaf5225fe30045288499c0ab762409f8d1defcb268e1d0ce14edb751ae04fc1df4bcf849c2b1a537126976a37b258c10210fb617b83b940d915f7c4179cf427b7f3e2ec8b3365539125d431b11ecabe2c94e4c6e01f9b6ec8caff07407e60648476cf0e5", 0xb9}], 0x1}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r2, r3}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$kcm(0x10, 0x2000000000001, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) 18:44:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x10e, 0xa, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="2e000000110081c5e43230ecdb4cb9040a485eb8be9294f9f25324f0758ef9000600b0eba06ac40006000300f9ff", 0x2e}], 0x1, &(0x7f0000000200)}, 0x0) 18:44:09 executing program 1: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0, 0x8}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 18:44:09 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)="579934592362c768d71111161aa226cb6d89b0d2acddcd4d18822246baf01ff49965b30560e16e07a4c5b25e74997c161467eb2f5f10fdd5550b78dfefdc2b38ed58c90c4858d06546582c0eccdcefccefc34e7e36eaf5225fe30045288499c0ab762409f8d1defcb268e1d0ce14edb751ae04fc1df4bcf849c2b1a537126976a37b258c10210fb617b83b940d915f7c4179cf427b7f3e2ec8b3365539125d431b11ecabe2c94e4c6e01f9b6ec8caff07407e60648476cf0e5", 0xb9}], 0x1}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r2, r3}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$kcm(0x10, 0x2000000000001, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) 18:44:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x10e, 0xa, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="2e000000110081c5e43230ecdb4cb9040a485eb8be9294f9f25324f0758ef9000600b0eba06ac40006000300f9ff", 0x2e}], 0x1, &(0x7f0000000200)}, 0x0) 18:44:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000023080)={0x0, 0x0, &(0x7f0000022f40)=[{0x0}], 0x1}, 0x1) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="48000000140081ae08060c04000f006b02027f03fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82afb9bbc7a461eb886a5e54e8ff53144", 0x48}], 0x1}, 0x0) 18:44:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x10e, 0xa, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="2e000000110081c5e43230ecdb4cb9040a485eb8be9294f9f25324f0758ef9000600b0eba06ac40006000300f9ff", 0x2e}], 0x1, &(0x7f0000000200)}, 0x0) 18:44:10 executing program 0: r0 = socket$kcm(0xa, 0x801, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002000000000000], [], @rand_addr=0xac141418}}, 0x80, 0x0}, 0x24000001) close(r0) 18:44:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000023080)={0x0, 0x0, &(0x7f0000022f40)=[{0x0}], 0x1}, 0x1) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="48000000140081ae08060c04000f006b02027f03fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82afb9bbc7a461eb886a5e54e8ff53144", 0x48}], 0x1}, 0x0) 18:44:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x10e, 0xa, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="2e000000110081c5e43230ecdb4cb9040a485eb8be9294f9f25324f0758ef9000600b0eba06ac40006000300f9ff", 0x2e}], 0x1, &(0x7f0000000200)}, 0x0) 18:44:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000023080)={0x0, 0x0, &(0x7f0000022f40)=[{0x0}], 0x1}, 0x1) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="48000000140081ae08060c04000f006b02027f03fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82afb9bbc7a461eb886a5e54e8ff53144", 0x48}], 0x1}, 0x0) 18:44:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000023080)={0x0, 0x0, &(0x7f0000022f40)=[{0x0}], 0x1}, 0x1) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="48000000140081ae08060c04000f006b02027f03fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82afb9bbc7a461eb886a5e54e8ff53144", 0x48}], 0x1}, 0x0) 18:44:10 executing program 0: r0 = socket$kcm(0xa, 0x801, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002000000000000], [], @rand_addr=0xac141418}}, 0x80, 0x0}, 0x24000001) close(r0) 18:44:10 executing program 4: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002d00)=""/4096, 0x1000}, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1302}}, 0x80, &(0x7f00000000c0), 0x2fe, &(0x7f0000000440)}, 0x0) recvmsg(r0, &(0x7f0000002cc0)={0x0, 0x8b, &(0x7f0000002b80)=[{&(0x7f0000003d00)=""/4096, 0xd19}], 0x23b}, 0x0) 18:44:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000023080)={0x0, 0x0, &(0x7f0000022f40)=[{0x0}], 0x1}, 0x1) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="48000000140081ae08060c04000f006b02027f03fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82afb9bbc7a461eb886a5e54e8ff53144", 0x48}], 0x1}, 0x0) 18:44:10 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000002500), 0x0, &(0x7f0000000080)=[{0x18, 0x29, 0x39, "c98b02"}], 0x18}, 0x0) 18:44:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x15, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x179, 0x14, 0x5f5e0ff}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x105c, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:44:10 executing program 0: r0 = socket$kcm(0xa, 0x801, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002000000000000], [], @rand_addr=0xac141418}}, 0x80, 0x0}, 0x24000001) close(r0) 18:44:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000023080)={0x0, 0x0, &(0x7f0000022f40)=[{0x0}], 0x1}, 0x1) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="48000000140081ae08060c04000f006b02027f03fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82afb9bbc7a461eb886a5e54e8ff53144", 0x48}], 0x1}, 0x0) 18:44:10 executing program 4: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002d00)=""/4096, 0x1000}, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1302}}, 0x80, &(0x7f00000000c0), 0x2fe, &(0x7f0000000440)}, 0x0) recvmsg(r0, &(0x7f0000002cc0)={0x0, 0x8b, &(0x7f0000002b80)=[{&(0x7f0000003d00)=""/4096, 0xd19}], 0x23b}, 0x0) 18:44:10 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000002500), 0x0, &(0x7f0000000080)=[{0x18, 0x29, 0x39, "c98b02"}], 0x18}, 0x0) 18:44:11 executing program 0: r0 = socket$kcm(0xa, 0x801, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002000000000000], [], @rand_addr=0xac141418}}, 0x80, 0x0}, 0x24000001) close(r0) 18:44:11 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002d00)=""/4096, 0x1000}, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1302}}, 0x80, &(0x7f00000000c0), 0x2fe, &(0x7f0000000440)}, 0x0) recvmsg(r0, &(0x7f0000002cc0)={0x0, 0x8b, &(0x7f0000002b80)=[{&(0x7f0000003d00)=""/4096, 0xd19}], 0x23b}, 0x0) 18:44:11 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000002500), 0x0, &(0x7f0000000080)=[{0x18, 0x29, 0x39, "c98b02"}], 0x18}, 0x0) 18:44:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x15, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x179, 0x14, 0x5f5e0ff}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x105c, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:44:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000023080)={0x0, 0x0, &(0x7f0000022f40)=[{0x0}], 0x1}, 0x1) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="48000000140081ae08060c04000f006b02027f03fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82afb9bbc7a461eb886a5e54e8ff53144", 0x48}], 0x1}, 0x0) 18:44:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000100)=ANY=[]}, 0x8000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000001580)}], 0x1}, 0x0) 18:44:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x15, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x179, 0x14, 0x5f5e0ff}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x105c, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:44:11 executing program 4: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002d00)=""/4096, 0x1000}, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1302}}, 0x80, &(0x7f00000000c0), 0x2fe, &(0x7f0000000440)}, 0x0) recvmsg(r0, &(0x7f0000002cc0)={0x0, 0x8b, &(0x7f0000002b80)=[{&(0x7f0000003d00)=""/4096, 0xd19}], 0x23b}, 0x0) 18:44:11 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002d00)=""/4096, 0x1000}, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1302}}, 0x80, &(0x7f00000000c0), 0x2fe, &(0x7f0000000440)}, 0x0) recvmsg(r0, &(0x7f0000002cc0)={0x0, 0x8b, &(0x7f0000002b80)=[{&(0x7f0000003d00)=""/4096, 0xd19}], 0x23b}, 0x0) 18:44:11 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000002500), 0x0, &(0x7f0000000080)=[{0x18, 0x29, 0x39, "c98b02"}], 0x18}, 0x0) 18:44:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e0000002f008163e400000000000000070f0000000000bc4cc91b4dd65b2f0d99c37023072a556d1c958c040000", 0x2e}], 0x1}, 0x0) 18:44:11 executing program 4: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002d00)=""/4096, 0x1000}, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1302}}, 0x80, &(0x7f00000000c0), 0x2fe, &(0x7f0000000440)}, 0x0) recvmsg(r0, &(0x7f0000002cc0)={0x0, 0x8b, &(0x7f0000002b80)=[{&(0x7f0000003d00)=""/4096, 0xd19}], 0x23b}, 0x0) 18:44:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x15, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x179, 0x14, 0x5f5e0ff}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x105c, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:44:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000100)=ANY=[]}, 0x8000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000001580)}], 0x1}, 0x0) 18:44:11 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002d00)=""/4096, 0x1000}, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1302}}, 0x80, &(0x7f00000000c0), 0x2fe, &(0x7f0000000440)}, 0x0) recvmsg(r0, &(0x7f0000002cc0)={0x0, 0x8b, &(0x7f0000002b80)=[{&(0x7f0000003d00)=""/4096, 0xd19}], 0x23b}, 0x0) 18:44:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000100)=ANY=[]}, 0x8000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000001580)}], 0x1}, 0x0) 18:44:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e0000002f008163e400000000000000070f0000000000bc4cc91b4dd65b2f0d99c37023072a556d1c958c040000", 0x2e}], 0x1}, 0x0) 18:44:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000100)=ANY=[]}, 0x8000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000001580)}], 0x1}, 0x0) 18:44:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000100)=ANY=[]}, 0x8000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000001580)}], 0x1}, 0x0) 18:44:12 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x16, 0x1, &(0x7f00000000c0)=@raw=[@alu], 0x0, 0x262, 0x3, &(0x7f0000000140)=""/3, 0x41000, 0x1, [], 0x0, 0x6, r0, 0x8, &(0x7f0000000180)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0xfffffffeffffffff, 0x9, 0x2, 0x100}, 0x10}, 0x70) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000280)=r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8910, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000040)=0x3) 18:44:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000100)=ANY=[]}, 0x8000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000001580)}], 0x1}, 0x0) 18:44:12 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x11x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 18:44:12 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e0000002f008163e400000000000000070f0000000000bc4cc91b4dd65b2f0d99c37023072a556d1c958c040000", 0x2e}], 0x1}, 0x0) 18:44:12 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x16, 0x1, &(0x7f00000000c0)=@raw=[@alu], 0x0, 0x262, 0x3, &(0x7f0000000140)=""/3, 0x41000, 0x1, [], 0x0, 0x6, r0, 0x8, &(0x7f0000000180)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0xfffffffeffffffff, 0x9, 0x2, 0x100}, 0x10}, 0x70) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000280)=r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8910, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000040)=0x3) 18:44:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000100)=ANY=[]}, 0x8000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000001580)}], 0x1}, 0x0) 18:44:12 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e0000002f008163e400000000000000070f0000000000bc4cc91b4dd65b2f0d99c37023072a556d1c958c040000", 0x2e}], 0x1}, 0x0) 18:44:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000100)=ANY=[]}, 0x8000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000001580)}], 0x1}, 0x0) 18:44:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000100)=ANY=[]}, 0x8000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000001580)}], 0x1}, 0x0) 18:44:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) 18:44:12 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000080)=0x9, 0x12) write$cgroup_subtree(r1, 0x0, 0x0) 18:44:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000100)=ANY=[]}, 0x8000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000001580)}], 0x1}, 0x0) 18:44:12 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x16, 0x1, &(0x7f00000000c0)=@raw=[@alu], 0x0, 0x262, 0x3, &(0x7f0000000140)=""/3, 0x41000, 0x1, [], 0x0, 0x6, r0, 0x8, &(0x7f0000000180)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0xfffffffeffffffff, 0x9, 0x2, 0x100}, 0x10}, 0x70) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000280)=r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8910, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000040)=0x3) 18:44:12 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x11x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 18:44:12 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x11x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 18:44:12 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000080)=0x9, 0x12) write$cgroup_subtree(r1, 0x0, 0x0) 18:44:13 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x16, 0x1, &(0x7f00000000c0)=@raw=[@alu], 0x0, 0x262, 0x3, &(0x7f0000000140)=""/3, 0x41000, 0x1, [], 0x0, 0x6, r0, 0x8, &(0x7f0000000180)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0xfffffffeffffffff, 0x9, 0x2, 0x100}, 0x10}, 0x70) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000280)=r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8910, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000040)=0x3) 18:44:13 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000080)=0x9, 0x12) write$cgroup_subtree(r1, 0x0, 0x0) 18:44:13 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000080)=0x9, 0x12) write$cgroup_subtree(r1, 0x0, 0x0) [ 359.641629][T20444] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 359.653339][T20444] CPU: 1 PID: 20444 Comm: syz-executor.3 Not tainted 5.1.0+ #1 [ 359.660899][T20444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.660978][T20444] Call Trace: [ 359.661036][T20444] dump_stack+0x172/0x1f0 [ 359.661057][T20444] dump_header+0x10f/0xb6c [ 359.661100][T20444] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 359.661115][T20444] ? ___ratelimit+0x60/0x595 [ 359.661130][T20444] ? do_raw_spin_unlock+0x57/0x270 [ 359.661151][T20444] oom_kill_process.cold+0x10/0x15 [ 359.683282][T20444] out_of_memory+0x79a/0x1280 [ 359.683302][T20444] ? __sched_text_start+0x8/0x8 [ 359.683318][T20444] ? oom_killer_disable+0x280/0x280 [ 359.683344][T20444] mem_cgroup_out_of_memory+0x1ca/0x230 [ 359.683365][T20444] ? memcg_event_wake+0x230/0x230 [ 359.683384][T20444] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 359.683399][T20444] ? cgroup_file_notify+0x140/0x1b0 [ 359.724458][T20444] memory_max_write+0x169/0x300 [ 359.735276][T20444] ? mem_cgroup_write+0x360/0x360 [ 359.735291][T20444] ? lock_acquire+0x16f/0x3f0 [ 359.735304][T20444] ? kernfs_fop_write+0x227/0x480 [ 359.735326][T20444] cgroup_file_write+0x241/0x790 [ 359.765171][T20444] ? mem_cgroup_write+0x360/0x360 [ 359.765188][T20444] ? init_and_link_css+0x860/0x860 [ 359.765214][T20444] ? init_and_link_css+0x860/0x860 [ 359.780479][T20444] kernfs_fop_write+0x2b8/0x480 [ 359.785349][T20444] __vfs_write+0x8a/0x110 [ 359.785364][T20444] ? kernfs_fop_open+0xd80/0xd80 [ 359.785380][T20444] vfs_write+0x20c/0x580 [ 359.785404][T20444] ksys_write+0x14f/0x290 [ 359.794679][T20444] ? __ia32_sys_read+0xb0/0xb0 [ 359.794699][T20444] ? do_syscall_64+0x26/0x680 [ 359.794718][T20444] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.794744][T20444] ? do_syscall_64+0x26/0x680 [ 359.803330][T20444] __x64_sys_write+0x73/0xb0 [ 359.803350][T20444] do_syscall_64+0xfd/0x680 [ 359.803371][T20444] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.803383][T20444] RIP: 0033:0x459279 [ 359.803399][T20444] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 359.803414][T20444] RSP: 002b:00007f1676854c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 359.828185][T20444] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 359.828195][T20444] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 18:44:13 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x11x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 18:44:13 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x11x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') [ 359.828202][T20444] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 359.828211][T20444] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16768556d4 [ 359.828219][T20444] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 359.962485][T20444] memory: usage 9260kB, limit 0kB, failcnt 0 [ 359.968780][T20444] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 360.030088][T20444] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 360.154772][T20444] Memory cgroup stats for /syz3: cache:32KB rss:4340KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4264KB inactive_file:0KB active_file:0KB unevictable:0KB [ 360.191856][T20444] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=20442,uid=0 [ 360.241619][T20444] Memory cgroup out of memory: Killed process 20442 (syz-executor.3) total-vm:72708kB, anon-rss:4204kB, file-rss:34816kB, shmem-rss:0kB [ 360.266502][ T1042] oom_reaper: reaped process 20442 (syz-executor.3), now anon-rss:0kB, file-rss:34860kB, shmem-rss:0kB 18:44:13 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000080)=0x9, 0x12) write$cgroup_subtree(r1, 0x0, 0x0) 18:44:13 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000080)=0x9, 0x12) write$cgroup_subtree(r1, 0x0, 0x0) 18:44:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) 18:44:13 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x11x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 18:44:13 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x11x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') [ 360.369994][ T8879] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 18:44:14 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x11x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') [ 360.450426][ T8879] CPU: 0 PID: 8879 Comm: syz-executor.3 Not tainted 5.1.0+ #1 [ 360.457915][ T8879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.467995][ T8879] Call Trace: [ 360.471299][ T8879] dump_stack+0x172/0x1f0 [ 360.475643][ T8879] dump_header+0x10f/0xb6c [ 360.480076][ T8879] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 360.485892][ T8879] ? ___ratelimit+0x60/0x595 [ 360.490487][ T8879] ? do_raw_spin_unlock+0x57/0x270 [ 360.495612][ T8879] oom_kill_process.cold+0x10/0x15 [ 360.500766][ T8879] out_of_memory+0x79a/0x1280 [ 360.505458][ T8879] ? lock_downgrade+0x880/0x880 [ 360.510314][ T8879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 360.510332][ T8879] ? oom_killer_disable+0x280/0x280 [ 360.510344][ T8879] ? find_held_lock+0x35/0x130 [ 360.510367][ T8879] mem_cgroup_out_of_memory+0x1ca/0x230 [ 360.510380][ T8879] ? memcg_event_wake+0x230/0x230 [ 360.510400][ T8879] ? do_raw_spin_unlock+0x57/0x270 [ 360.510419][ T8879] ? _raw_spin_unlock+0x2d/0x50 [ 360.510436][ T8879] try_charge+0x102c/0x15c0 [ 360.510448][ T8879] ? find_held_lock+0x35/0x130 [ 360.510468][ T8879] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 360.562307][ T8879] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 360.567873][ T8879] ? find_held_lock+0x35/0x130 [ 360.572656][ T8879] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 360.578294][ T8879] __memcg_kmem_charge_memcg+0x7c/0x130 [ 360.583859][ T8879] ? memcg_kmem_put_cache+0xb0/0xb0 [ 360.589072][ T8879] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 360.594680][ T8879] __memcg_kmem_charge+0x136/0x300 [ 360.599840][ T8879] __alloc_pages_nodemask+0x4bd/0x8d0 [ 360.605245][ T8879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 360.611510][ T8879] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 360.617282][ T8879] ? copy_process.part.0+0x43eb/0x6710 [ 360.622797][ T8879] ? lockdep_hardirqs_on+0x418/0x5d0 [ 360.628180][ T8879] ? trace_hardirqs_on+0x67/0x220 [ 360.633251][ T8879] ? kasan_check_read+0x11/0x20 [ 360.638122][ T8879] copy_process.part.0+0x4a0/0x6710 [ 360.643329][ T8879] ? __might_fault+0x12b/0x1e0 [ 360.643353][ T8879] ? __cleanup_sighand+0x60/0x60 [ 360.643368][ T8879] ? lock_downgrade+0x880/0x880 [ 360.643393][ T8879] _do_fork+0x25d/0xfe0 [ 360.643412][ T8879] ? copy_init_mm+0x20/0x20 [ 360.643436][ T8879] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 360.643450][ T8879] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 360.643470][ T8879] ? do_syscall_64+0x26/0x680 [ 360.682209][ T8879] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.688305][ T8879] ? do_syscall_64+0x26/0x680 [ 360.693082][ T8879] __x64_sys_clone+0xbf/0x150 [ 360.697766][ T8879] do_syscall_64+0xfd/0x680 [ 360.702369][ T8879] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.708269][ T8879] RIP: 0033:0x45784a [ 360.712168][ T8879] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 360.731780][ T8879] RSP: 002b:00007ffc49dde1c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 360.740201][ T8879] RAX: ffffffffffffffda RBX: 00007ffc49dde1c0 RCX: 000000000045784a 18:44:14 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000080)=0x9, 0x12) write$cgroup_subtree(r1, 0x0, 0x0) 18:44:14 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 360.748197][ T8879] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 360.756188][ T8879] RBP: 00007ffc49dde200 R08: 0000000000000001 R09: 0000000001725940 [ 360.764194][ T8879] R10: 0000000001725c10 R11: 0000000000000246 R12: 0000000000000001 [ 360.772188][ T8879] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc49dde250 [ 360.874163][ T8879] memory: usage 4824kB, limit 0kB, failcnt 8 [ 360.886154][ T8879] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 360.898268][ T8879] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 360.908608][ T8879] Memory cgroup stats for /syz3: cache:32KB rss:84KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:144KB inactive_file:0KB active_file:0KB unevictable:0KB [ 360.943793][ T8879] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8879,uid=0 18:44:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 360.976297][ T8879] Memory cgroup out of memory: Killed process 8879 (syz-executor.3) total-vm:72444kB, anon-rss:108kB, file-rss:35776kB, shmem-rss:0kB [ 361.077669][ T1042] oom_reaper: reaped process 8879 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 18:44:14 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x11x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 18:44:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 361.372967][T20518] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 361.392953][T20518] CPU: 0 PID: 20518 Comm: syz-executor.4 Not tainted 5.1.0+ #1 [ 361.400537][T20518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.410610][T20518] Call Trace: [ 361.410636][T20518] dump_stack+0x172/0x1f0 [ 361.410655][T20518] dump_header+0x10f/0xb6c [ 361.410674][T20518] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 361.410687][T20518] ? ___ratelimit+0x60/0x595 [ 361.410702][T20518] ? do_raw_spin_unlock+0x57/0x270 [ 361.410719][T20518] oom_kill_process.cold+0x10/0x15 [ 361.410735][T20518] out_of_memory+0x79a/0x1280 [ 361.410752][T20518] ? __sched_text_start+0x8/0x8 [ 361.410769][T20518] ? oom_killer_disable+0x280/0x280 [ 361.410793][T20518] mem_cgroup_out_of_memory+0x1ca/0x230 [ 361.463674][T20518] ? memcg_event_wake+0x230/0x230 [ 361.468726][T20518] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 361.474560][T20518] ? cgroup_file_notify+0x140/0x1b0 [ 361.479785][T20518] memory_max_write+0x169/0x300 [ 361.484686][T20518] ? mem_cgroup_write+0x360/0x360 [ 361.489729][T20518] ? lock_acquire+0x16f/0x3f0 [ 361.494419][T20518] ? kernfs_fop_write+0x227/0x480 [ 361.499552][T20518] cgroup_file_write+0x241/0x790 [ 361.504503][T20518] ? mem_cgroup_write+0x360/0x360 [ 361.509539][T20518] ? init_and_link_css+0x860/0x860 [ 361.514669][T20518] ? init_and_link_css+0x860/0x860 [ 361.519794][T20518] kernfs_fop_write+0x2b8/0x480 [ 361.524662][T20518] __vfs_write+0x8a/0x110 [ 361.529007][T20518] ? kernfs_fop_open+0xd80/0xd80 [ 361.533958][T20518] vfs_write+0x20c/0x580 [ 361.538215][T20518] ksys_write+0x14f/0x290 [ 361.542633][T20518] ? __ia32_sys_read+0xb0/0xb0 [ 361.547416][T20518] __x64_sys_write+0x73/0xb0 [ 361.552021][T20518] do_syscall_64+0xfd/0x680 [ 361.556549][T20518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.562455][T20518] RIP: 0033:0x459279 [ 361.566359][T20518] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 361.585977][T20518] RSP: 002b:00007f9d28cf9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 361.594431][T20518] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 361.602415][T20518] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 361.610401][T20518] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 361.618387][T20518] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9d28cfa6d4 [ 361.626378][T20518] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 361.657513][T20518] memory: usage 8208kB, limit 0kB, failcnt 0 [ 361.664265][T20518] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 361.672786][T20518] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 361.680072][T20518] Memory cgroup stats for /syz4: cache:48KB rss:4196KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4196KB inactive_file:112KB active_file:0KB unevictable:0KB [ 361.713889][T20518] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=20517,uid=0 [ 361.730809][T20518] Memory cgroup out of memory: Killed process 20517 (syz-executor.4) total-vm:72708kB, anon-rss:4256kB, file-rss:35776kB, shmem-rss:0kB [ 361.749822][ T1042] oom_reaper: reaped process 20517 (syz-executor.4), now anon-rss:0kB, file-rss:34916kB, shmem-rss:0kB [ 361.752612][T20519] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 361.771535][T20519] CPU: 0 PID: 20519 Comm: syz-executor.2 Not tainted 5.1.0+ #1 [ 361.779122][T20519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.789191][T20519] Call Trace: [ 361.792521][T20519] dump_stack+0x172/0x1f0 [ 361.796881][T20519] dump_header+0x10f/0xb6c [ 361.801328][T20519] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 361.807156][T20519] ? ___ratelimit+0x60/0x595 [ 361.811765][T20519] ? do_raw_spin_unlock+0x57/0x270 [ 361.816900][T20519] oom_kill_process.cold+0x10/0x15 [ 361.822167][T20519] out_of_memory+0x79a/0x1280 [ 361.826873][T20519] ? oom_killer_disable+0x280/0x280 [ 361.832087][T20519] ? cgroup_file_notify+0x140/0x1b0 [ 361.837317][T20519] mem_cgroup_out_of_memory+0x1ca/0x230 [ 361.842884][T20519] ? memcg_event_wake+0x230/0x230 [ 361.848025][T20519] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 361.853855][T20519] ? cgroup_file_notify+0x140/0x1b0 [ 361.859077][T20519] memory_max_write+0x169/0x300 [ 361.864047][T20519] ? mem_cgroup_write+0x360/0x360 [ 361.869087][T20519] ? lock_acquire+0x16f/0x3f0 [ 361.873786][T20519] ? kernfs_fop_write+0x227/0x480 [ 361.878834][T20519] cgroup_file_write+0x241/0x790 [ 361.883799][T20519] ? mem_cgroup_write+0x360/0x360 [ 361.888847][T20519] ? init_and_link_css+0x860/0x860 [ 361.893983][T20519] ? init_and_link_css+0x860/0x860 [ 361.899116][T20519] kernfs_fop_write+0x2b8/0x480 [ 361.903998][T20519] __vfs_write+0x8a/0x110 [ 361.909824][T20519] ? kernfs_fop_open+0xd80/0xd80 [ 361.914783][T20519] vfs_write+0x20c/0x580 [ 361.919054][T20519] ksys_write+0x14f/0x290 [ 361.923410][T20519] ? __ia32_sys_read+0xb0/0xb0 [ 361.928206][T20519] ? do_syscall_64+0x26/0x680 [ 361.932921][T20519] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.939009][T20519] ? do_syscall_64+0x26/0x680 [ 361.943716][T20519] __x64_sys_write+0x73/0xb0 [ 361.948337][T20519] do_syscall_64+0xfd/0x680 [ 361.952868][T20519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.958805][T20519] RIP: 0033:0x459279 [ 361.962719][T20519] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 361.982348][T20519] RSP: 002b:00007fa5bbcecc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 361.990787][T20519] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 362.001307][T20519] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 362.009298][T20519] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 362.017288][T20519] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5bbced6d4 [ 362.025276][T20519] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 362.041986][T20519] memory: usage 8584kB, limit 0kB, failcnt 0 [ 362.056936][T20519] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 18:44:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) 18:44:15 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x11x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') [ 362.101081][T20519] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 362.107967][T20519] Memory cgroup stats for /syz2: cache:232KB rss:4220KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4220KB inactive_file:132KB active_file:132KB unevictable:0KB 18:44:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) 18:44:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 362.300619][T20519] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=20511,uid=0 [ 362.381566][T20519] Memory cgroup out of memory: Killed process 20519 (syz-executor.2) total-vm:72840kB, anon-rss:4260kB, file-rss:35892kB, shmem-rss:0kB [ 362.441865][ T1042] oom_reaper: reaped process 20519 (syz-executor.2), now anon-rss:0kB, file-rss:34932kB, shmem-rss:0kB [ 362.460730][ T8873] syz-executor.1 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 362.500641][ T8873] CPU: 0 PID: 8873 Comm: syz-executor.1 Not tainted 5.1.0+ #1 [ 362.508132][ T8873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.518198][ T8873] Call Trace: [ 362.521518][ T8873] dump_stack+0x172/0x1f0 [ 362.525866][ T8873] dump_header+0x10f/0xb6c [ 362.530299][ T8873] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 362.536122][ T8873] ? ___ratelimit+0x60/0x595 [ 362.540727][ T8873] ? do_raw_spin_unlock+0x57/0x270 [ 362.545856][ T8873] oom_kill_process.cold+0x10/0x15 18:44:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 362.550987][ T8873] out_of_memory+0x79a/0x1280 [ 362.555688][ T8873] ? oom_killer_disable+0x280/0x280 [ 362.560889][ T8873] ? find_held_lock+0x35/0x130 [ 362.560914][ T8873] mem_cgroup_out_of_memory+0x1ca/0x230 [ 362.560928][ T8873] ? memcg_event_wake+0x230/0x230 [ 362.560947][ T8873] ? do_raw_spin_unlock+0x57/0x270 [ 362.560965][ T8873] ? _raw_spin_unlock+0x2d/0x50 [ 362.560982][ T8873] try_charge+0x102c/0x15c0 [ 362.561005][ T8873] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 362.571320][ T8873] ? rcu_read_lock_sched_held+0x110/0x130 [ 362.571338][ T8873] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 362.571361][ T8873] __memcg_kmem_charge_memcg+0x7c/0x130 [ 362.571376][ T8873] ? memcg_kmem_put_cache+0xb0/0xb0 [ 362.571392][ T8873] ? cache_grow_begin+0x58e/0x850 [ 362.571405][ T8873] ? lockdep_hardirqs_on+0x418/0x5d0 [ 362.571420][ T8873] ? trace_hardirqs_on+0x67/0x220 [ 362.571437][ T8873] cache_grow_begin+0x5ba/0x850 [ 362.571454][ T8873] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 362.571468][ T8873] ? __cpuset_node_allowed+0x136/0x540 [ 362.571488][ T8873] fallback_alloc+0x1fd/0x2d0 [ 362.654995][ T8873] ____cache_alloc_node+0x1be/0x1e0 [ 362.660209][ T8873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 362.666490][ T8873] kmem_cache_alloc_node+0xe3/0x710 [ 362.671705][ T8873] ? lockdep_hardirqs_on+0x418/0x5d0 [ 362.677010][ T8873] ? trace_hardirqs_on+0x67/0x220 [ 362.682057][ T8873] copy_process.part.0+0x43eb/0x6710 [ 362.687363][ T8873] ? __might_fault+0x12b/0x1e0 [ 362.692154][ T8873] ? __cleanup_sighand+0x60/0x60 [ 362.697102][ T8873] ? lock_downgrade+0x880/0x880 [ 362.701983][ T8873] _do_fork+0x25d/0xfe0 [ 362.706159][ T8873] ? copy_init_mm+0x20/0x20 [ 362.710686][ T8873] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 362.716155][ T8873] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 362.721632][ T8873] ? do_syscall_64+0x26/0x680 [ 362.726329][ T8873] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.732412][ T8873] ? do_syscall_64+0x26/0x680 [ 362.737109][ T8873] __x64_sys_clone+0xbf/0x150 [ 362.741811][ T8873] do_syscall_64+0xfd/0x680 [ 362.746335][ T8873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.752256][ T8873] RIP: 0033:0x45784a [ 362.756162][ T8873] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 362.775784][ T8873] RSP: 002b:00007ffc518982c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 362.784214][ T8873] RAX: ffffffffffffffda RBX: 00007ffc518982c0 RCX: 000000000045784a [ 362.792217][ T8873] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 362.800219][ T8873] RBP: 00007ffc51898300 R08: 0000000000000001 R09: 0000000000a8b940 [ 362.808241][ T8873] R10: 0000000000a8bc10 R11: 0000000000000246 R12: 0000000000000001 [ 362.816244][ T8873] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc51898350 [ 362.825140][ T8873] memory: usage 3736kB, limit 0kB, failcnt 12 [ 362.836963][ T8873] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 362.844605][ T8873] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 18:44:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 362.844618][ T8873] Memory cgroup stats for /syz1: cache:28KB rss:172KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:92KB inactive_file:148KB active_file:64KB unevictable:0KB [ 362.872964][ T8873] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=8873,uid=0 [ 362.888797][ T8873] Memory cgroup out of memory: Killed process 8873 (syz-executor.1) total-vm:72444kB, anon-rss:104kB, file-rss:35776kB, shmem-rss:0kB [ 362.904767][ T8876] syz-executor.2 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 362.905096][ T1042] oom_reaper: reaped process 8873 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 362.916474][ T8876] CPU: 0 PID: 8876 Comm: syz-executor.2 Not tainted 5.1.0+ #1 [ 362.934362][ T8876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.950166][ T8876] Call Trace: [ 362.950194][ T8876] dump_stack+0x172/0x1f0 [ 362.950212][ T8876] dump_header+0x10f/0xb6c [ 362.950248][ T8876] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 362.950261][ T8876] ? ___ratelimit+0x60/0x595 [ 362.950275][ T8876] ? do_raw_spin_unlock+0x57/0x270 [ 362.950291][ T8876] oom_kill_process.cold+0x10/0x15 [ 362.950305][ T8876] out_of_memory+0x79a/0x1280 [ 362.950324][ T8876] ? oom_killer_disable+0x280/0x280 [ 362.950334][ T8876] ? find_held_lock+0x35/0x130 [ 362.950358][ T8876] mem_cgroup_out_of_memory+0x1ca/0x230 [ 362.950371][ T8876] ? memcg_event_wake+0x230/0x230 [ 362.950388][ T8876] ? do_raw_spin_unlock+0x57/0x270 [ 362.950403][ T8876] ? _raw_spin_unlock+0x2d/0x50 [ 362.950420][ T8876] try_charge+0x102c/0x15c0 [ 362.950442][ T8876] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 362.950461][ T8876] ? rcu_read_lock_sched_held+0x110/0x130 [ 362.950476][ T8876] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 362.950498][ T8876] __memcg_kmem_charge_memcg+0x7c/0x130 [ 362.950513][ T8876] ? memcg_kmem_put_cache+0xb0/0xb0 [ 362.950528][ T8876] ? cache_grow_begin+0x58e/0x850 [ 362.950543][ T8876] ? lockdep_hardirqs_on+0x418/0x5d0 [ 362.950558][ T8876] ? trace_hardirqs_on+0x67/0x220 [ 362.950580][ T8876] cache_grow_begin+0x5ba/0x850 [ 362.998793][ T8876] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 363.009343][ T8876] ? __cpuset_node_allowed+0x136/0x540 [ 363.009365][ T8876] fallback_alloc+0x1fd/0x2d0 [ 363.009389][ T8876] ____cache_alloc_node+0x1be/0x1e0 [ 363.023868][ T8876] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 363.023890][ T8876] kmem_cache_alloc_node_trace+0xec/0x720 [ 363.023905][ T8876] ? lock_downgrade+0x880/0x880 [ 363.023925][ T8876] __kmalloc_node+0x3d/0x70 [ 363.023941][ T8876] kvmalloc_node+0x68/0x100 [ 363.024043][ T8876] xt_alloc_table_info+0x41/0xa0 [ 363.024083][ T8876] do_ipt_set_ctl+0x25a/0x492 [ 363.024102][ T8876] ? compat_do_ipt_set_ctl+0x160/0x160 [ 363.040915][ T8876] ? mutex_unlock+0xd/0x10 [ 363.041019][ T8876] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 363.041040][ T8876] nf_setsockopt+0x77/0xd0 [ 363.051870][ T8876] ip_setsockopt+0xdf/0x100 [ 363.051915][ T8876] tcp_setsockopt+0x8f/0xe0 [ 363.051955][ T8876] sock_common_setsockopt+0x94/0xd0 [ 363.051998][ T8876] __sys_setsockopt+0x17a/0x280 [ 363.067316][ T8876] ? kernel_accept+0x310/0x310 [ 363.067332][ T8876] ? kasan_check_write+0x14/0x20 [ 363.067354][ T8876] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 363.088582][ T8876] ? do_syscall_64+0x26/0x680 [ 363.088601][ T8876] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.088621][ T8876] ? do_syscall_64+0x26/0x680 [ 363.115099][ T8876] __x64_sys_setsockopt+0xbe/0x150 [ 363.115126][ T8876] do_syscall_64+0xfd/0x680 [ 363.124567][ T8876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.124588][ T8876] RIP: 0033:0x45bdaa [ 363.140569][ T8876] Code: 49 89 ca b8 37 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ba 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 363.140578][ T8876] RSP: 002b:00007ffe4d9143c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000036 [ 363.140590][ T8876] RAX: ffffffffffffffda RBX: 00007ffe4d9143f0 RCX: 000000000045bdaa [ 363.140598][ T8876] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 363.140605][ T8876] RBP: 0000000000712e80 R08: 0000000000000408 R09: 0000000000004000 [ 363.140613][ T8876] R10: 0000000000711aa0 R11: 0000000000000202 R12: 0000000000000003 [ 363.140621][ T8876] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000711a40 [ 363.152321][ T8876] memory: usage 4208kB, limit 0kB, failcnt 12 [ 363.165973][ T8876] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 363.175556][ T8876] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 363.186075][ T8876] Memory cgroup stats for /syz2: cache:232KB rss:88KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:132KB active_file:132KB unevictable:0KB [ 363.196916][ T8876] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=8876,uid=0 [ 363.211561][ T8876] Memory cgroup out of memory: Killed process 8876 (syz-executor.2) total-vm:72444kB, anon-rss:104kB, file-rss:35776kB, shmem-rss:0kB [ 363.241289][ T8881] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 363.250163][ T1042] oom_reaper: reaped process 8876 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 363.258185][ T8881] CPU: 0 PID: 8881 Comm: syz-executor.4 Not tainted 5.1.0+ #1 [ 363.273426][ T8881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.289402][ T8881] Call Trace: [ 363.289427][ T8881] dump_stack+0x172/0x1f0 [ 363.289447][ T8881] dump_header+0x10f/0xb6c [ 363.289470][ T8881] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 363.303069][ T8881] ? ___ratelimit+0x60/0x595 [ 363.303085][ T8881] ? do_raw_spin_unlock+0x57/0x270 [ 363.303103][ T8881] oom_kill_process.cold+0x10/0x15 [ 363.303120][ T8881] out_of_memory+0x79a/0x1280 [ 363.303140][ T8881] ? oom_killer_disable+0x280/0x280 [ 363.303151][ T8881] ? find_held_lock+0x35/0x130 [ 363.303175][ T8881] mem_cgroup_out_of_memory+0x1ca/0x230 [ 363.303189][ T8881] ? memcg_event_wake+0x230/0x230 [ 363.303210][ T8881] ? do_raw_spin_unlock+0x57/0x270 [ 363.330806][ T8881] ? _raw_spin_unlock+0x2d/0x50 [ 363.330826][ T8881] try_charge+0x102c/0x15c0 [ 363.330839][ T8881] ? find_held_lock+0x35/0x130 [ 363.330858][ T8881] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 363.330871][ T8881] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 363.330883][ T8881] ? find_held_lock+0x35/0x130 [ 363.330896][ T8881] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 363.330922][ T8881] __memcg_kmem_charge_memcg+0x7c/0x130 [ 363.330937][ T8881] ? memcg_kmem_put_cache+0xb0/0xb0 [ 363.330954][ T8881] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 363.330972][ T8881] __memcg_kmem_charge+0x136/0x300 [ 363.330996][ T8881] __alloc_pages_nodemask+0x4bd/0x8d0 [ 363.359987][ T8881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 363.360008][ T8881] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 363.360025][ T8881] ? copy_process.part.0+0x43eb/0x6710 [ 363.360047][ T8881] ? lockdep_hardirqs_on+0x418/0x5d0 [ 363.382777][ T8881] ? trace_hardirqs_on+0x67/0x220 [ 363.382791][ T8881] ? kasan_check_read+0x11/0x20 [ 363.382810][ T8881] copy_process.part.0+0x4a0/0x6710 [ 363.382828][ T8881] ? __might_fault+0x12b/0x1e0 [ 363.382851][ T8881] ? __cleanup_sighand+0x60/0x60 [ 363.382872][ T8881] ? lock_downgrade+0x880/0x880 [ 363.400418][ T8881] _do_fork+0x25d/0xfe0 [ 363.400441][ T8881] ? copy_init_mm+0x20/0x20 [ 363.400464][ T8881] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 363.400479][ T8881] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 363.400500][ T8881] ? do_syscall_64+0x26/0x680 [ 363.408112][ T8881] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.408126][ T8881] ? do_syscall_64+0x26/0x680 [ 363.408149][ T8881] __x64_sys_clone+0xbf/0x150 [ 363.422935][ T8881] do_syscall_64+0xfd/0x680 [ 363.422957][ T8881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.422969][ T8881] RIP: 0033:0x45784a [ 363.422984][ T8881] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 363.422991][ T8881] RSP: 002b:00007ffe2a30ebb0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 363.423003][ T8881] RAX: ffffffffffffffda RBX: 00007ffe2a30ebb0 RCX: 000000000045784a [ 363.423010][ T8881] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 363.423018][ T8881] RBP: 00007ffe2a30ebf0 R08: 0000000000000001 R09: 0000000000dfc940 [ 363.423026][ T8881] R10: 0000000000dfcc10 R11: 0000000000000246 R12: 0000000000000001 [ 363.423033][ T8881] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe2a30ec40 [ 363.436394][ T8881] memory: usage 3720kB, limit 0kB, failcnt 8 [ 363.448504][ T8881] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 363.715205][ T8881] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 363.725696][ T8881] Memory cgroup stats for /syz4: cache:48KB rss:80KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:80KB inactive_file:112KB active_file:0KB unevictable:0KB 18:44:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 363.746707][ T8881] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8881,uid=0 [ 363.762579][ T8881] Memory cgroup out of memory: Killed process 8881 (syz-executor.4) total-vm:72444kB, anon-rss:108kB, file-rss:35776kB, shmem-rss:0kB [ 363.777124][ T1042] oom_reaper: reaped process 8881 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 363.998322][T20545] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 364.009040][T20545] CPU: 0 PID: 20545 Comm: syz-executor.0 Not tainted 5.1.0+ #1 [ 364.016612][T20545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.026684][T20545] Call Trace: [ 364.029999][T20545] dump_stack+0x172/0x1f0 [ 364.034404][T20545] dump_header+0x10f/0xb6c [ 364.038839][T20545] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 364.044659][T20545] ? ___ratelimit+0x60/0x595 [ 364.049277][T20545] ? do_raw_spin_unlock+0x57/0x270 [ 364.054405][T20545] oom_kill_process.cold+0x10/0x15 [ 364.059538][T20545] out_of_memory+0x79a/0x1280 [ 364.064249][T20545] ? __sched_text_start+0x8/0x8 [ 364.069125][T20545] ? oom_killer_disable+0x280/0x280 [ 364.074338][T20545] ? cgroup_file_notify+0x140/0x1b0 [ 364.079563][T20545] mem_cgroup_out_of_memory+0x1ca/0x230 [ 364.085132][T20545] ? memcg_event_wake+0x230/0x230 [ 364.090194][T20545] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 364.096133][T20545] ? cgroup_file_notify+0x140/0x1b0 [ 364.101493][T20545] memory_max_write+0x169/0x300 [ 364.106383][T20545] ? mem_cgroup_write+0x360/0x360 [ 364.111431][T20545] ? lock_acquire+0x16f/0x3f0 [ 364.116126][T20545] ? kernfs_fop_write+0x227/0x480 [ 364.121175][T20545] cgroup_file_write+0x241/0x790 [ 364.126135][T20545] ? mem_cgroup_write+0x360/0x360 [ 364.131171][T20545] ? init_and_link_css+0x860/0x860 [ 364.136308][T20545] ? init_and_link_css+0x860/0x860 [ 364.141430][T20545] kernfs_fop_write+0x2b8/0x480 [ 364.146299][T20545] __vfs_write+0x8a/0x110 [ 364.150640][T20545] ? kernfs_fop_open+0xd80/0xd80 [ 364.155613][T20545] vfs_write+0x20c/0x580 [ 364.159874][T20545] ksys_write+0x14f/0x290 [ 364.164207][T20545] ? __ia32_sys_read+0xb0/0xb0 [ 364.169001][T20545] __x64_sys_write+0x73/0xb0 [ 364.173593][T20545] ? do_syscall_64+0x5b/0x680 [ 364.178291][T20545] do_syscall_64+0xfd/0x680 [ 364.182807][T20545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.188688][T20545] RIP: 0033:0x459279 [ 364.192582][T20545] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 364.212196][T20545] RSP: 002b:00007fbe43703c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 364.220634][T20545] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 364.228596][T20545] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 364.236562][T20545] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 364.244537][T20545] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbe437046d4 [ 364.252540][T20545] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 364.263203][T20545] memory: usage 9232kB, limit 0kB, failcnt 0 [ 364.269305][T20545] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 364.277155][T20545] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 364.284274][T20545] Memory cgroup stats for /syz0: cache:100KB rss:4200KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4200KB [ 364.284570][T20545] inactive_file:0KB active_file:0KB unevictable:0KB [ 364.308424][T20545] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=20544,uid=0 [ 364.326903][T20545] Memory cgroup out of memory: Killed process 20544 (syz-executor.0) total-vm:72576kB, anon-rss:4240kB, file-rss:35784kB, shmem-rss:0kB [ 364.344218][ T1042] oom_reaper: reaped process 20544 (syz-executor.0), now anon-rss:0kB, file-rss:34912kB, shmem-rss:0kB 18:44:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) 18:44:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 364.948096][T20549] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 364.960148][T20549] CPU: 1 PID: 20549 Comm: syz-executor.5 Not tainted 5.1.0+ #1 [ 364.970164][T20549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.986915][T20549] Call Trace: [ 364.990310][T20549] dump_stack+0x172/0x1f0 [ 364.994795][T20549] dump_header+0x10f/0xb6c [ 364.999237][T20549] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 365.005052][T20549] ? ___ratelimit+0x60/0x595 [ 365.009651][T20549] ? do_raw_spin_unlock+0x57/0x270 [ 365.014897][T20549] oom_kill_process.cold+0x10/0x15 [ 365.019996][T20549] out_of_memory+0x79a/0x1280 [ 365.025097][T20549] ? __sched_text_start+0x8/0x8 [ 365.029950][T20549] ? oom_killer_disable+0x280/0x280 [ 365.035132][T20549] ? cgroup_file_notify+0x140/0x1b0 [ 365.040320][T20549] mem_cgroup_out_of_memory+0x1ca/0x230 [ 365.045919][T20549] ? memcg_event_wake+0x230/0x230 [ 365.050990][T20549] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 365.056803][T20549] ? cgroup_file_notify+0x140/0x1b0 [ 365.061990][T20549] memory_max_write+0x169/0x300 [ 365.066847][T20549] ? mem_cgroup_write+0x360/0x360 [ 365.072014][T20549] ? lock_acquire+0x16f/0x3f0 [ 365.076675][T20549] ? kernfs_fop_write+0x227/0x480 [ 365.081694][T20549] cgroup_file_write+0x241/0x790 [ 365.086622][T20549] ? mem_cgroup_write+0x360/0x360 [ 365.091638][T20549] ? init_and_link_css+0x860/0x860 [ 365.096744][T20549] ? init_and_link_css+0x860/0x860 [ 365.101841][T20549] kernfs_fop_write+0x2b8/0x480 [ 365.106678][T20549] __vfs_write+0x8a/0x110 [ 365.110992][T20549] ? kernfs_fop_open+0xd80/0xd80 [ 365.115946][T20549] vfs_write+0x20c/0x580 [ 365.120188][T20549] ksys_write+0x14f/0x290 [ 365.124533][T20549] ? __ia32_sys_read+0xb0/0xb0 [ 365.129306][T20549] ? do_syscall_64+0x26/0x680 [ 365.133979][T20549] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.140028][T20549] ? do_syscall_64+0x26/0x680 [ 365.146393][T20549] __x64_sys_write+0x73/0xb0 [ 365.150968][T20549] do_syscall_64+0xfd/0x680 [ 365.155460][T20549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.161335][T20549] RIP: 0033:0x459279 [ 365.165235][T20549] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 365.184835][T20549] RSP: 002b:00007f40bf640c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 365.193247][T20549] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 365.201219][T20549] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 365.209207][T20549] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 365.217181][T20549] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40bf6416d4 [ 365.225134][T20549] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 365.235362][T20549] memory: usage 8728kB, limit 0kB, failcnt 0 [ 365.241435][T20549] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 365.241446][T20549] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 365.241453][T20549] Memory cgroup stats for /syz5: cache:76KB rss:4244KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4244KB inactive_file:128KB active_file:92KB unevictable:0KB [ 365.241534][T20549] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=20547,uid=0 18:44:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) 18:44:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 365.256019][T20549] Memory cgroup out of memory: Killed process 20547 (syz-executor.5) total-vm:72708kB, anon-rss:4252kB, file-rss:35780kB, shmem-rss:0kB [ 365.312160][ T1042] oom_reaper: reaped process 20547 (syz-executor.5), now anon-rss:0kB, file-rss:34896kB, shmem-rss:0kB [ 365.336082][T20542] IPVS: ftp: loaded support on port[0] = 21 18:44:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 365.479760][ T8884] syz-executor.5 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 365.500576][ T8884] CPU: 1 PID: 8884 Comm: syz-executor.5 Not tainted 5.1.0+ #1 [ 365.508064][ T8884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.518121][ T8884] Call Trace: [ 365.521507][ T8884] dump_stack+0x172/0x1f0 [ 365.525876][ T8884] dump_header+0x10f/0xb6c [ 365.530308][ T8884] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 365.536121][ T8884] ? ___ratelimit+0x60/0x595 [ 365.540716][ T8884] ? do_raw_spin_unlock+0x57/0x270 [ 365.545843][ T8884] oom_kill_process.cold+0x10/0x15 [ 365.550979][ T8884] out_of_memory+0x79a/0x1280 [ 365.555668][ T8884] ? lock_downgrade+0x880/0x880 [ 365.560522][ T8884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 365.566781][ T8884] ? oom_killer_disable+0x280/0x280 [ 365.571986][ T8884] ? find_held_lock+0x35/0x130 [ 365.576778][ T8884] mem_cgroup_out_of_memory+0x1ca/0x230 [ 365.582337][ T8884] ? memcg_event_wake+0x230/0x230 [ 365.587370][ T8884] ? do_raw_spin_unlock+0x57/0x270 [ 365.592492][ T8884] ? _raw_spin_unlock+0x2d/0x50 [ 365.597337][ T8884] try_charge+0x102c/0x15c0 [ 365.603447][ T8884] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 365.609095][ T8884] ? rcu_read_lock_sched_held+0x110/0x130 [ 365.615104][ T8884] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 365.620701][ T8884] __memcg_kmem_charge_memcg+0x7c/0x130 [ 365.626255][ T8884] ? memcg_kmem_put_cache+0xb0/0xb0 [ 365.631456][ T8884] ? cache_grow_begin+0x58e/0x850 [ 365.636485][ T8884] ? lockdep_hardirqs_on+0x418/0x5d0 [ 365.641847][ T8884] ? trace_hardirqs_on+0x67/0x220 [ 365.646863][ T8884] cache_grow_begin+0x5ba/0x850 [ 365.651709][ T8884] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 365.657985][ T8884] ? __cpuset_node_allowed+0x136/0x540 [ 365.663463][ T8884] fallback_alloc+0x1fd/0x2d0 [ 365.668206][ T8884] ____cache_alloc_node+0x1be/0x1e0 [ 365.673408][ T8884] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 365.679742][ T8884] kmem_cache_alloc_node_trace+0xec/0x720 [ 365.685458][ T8884] ? lock_downgrade+0x880/0x880 [ 365.690327][ T8884] __kmalloc_node+0x3d/0x70 [ 365.694837][ T8884] kvmalloc_node+0x68/0x100 [ 365.699328][ T8884] xt_alloc_table_info+0x41/0xa0 [ 365.704257][ T8884] do_ipt_set_ctl+0x25a/0x492 [ 365.708919][ T8884] ? compat_do_ipt_set_ctl+0x160/0x160 [ 365.714368][ T8884] ? mutex_unlock+0xd/0x10 [ 365.718784][ T8884] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 365.724783][ T8884] nf_setsockopt+0x77/0xd0 [ 365.729211][ T8884] ip_setsockopt+0xdf/0x100 [ 365.733717][ T8884] tcp_setsockopt+0x8f/0xe0 [ 365.738209][ T8884] sock_common_setsockopt+0x94/0xd0 [ 365.743406][ T8884] __sys_setsockopt+0x17a/0x280 [ 365.748249][ T8884] ? kernel_accept+0x310/0x310 [ 365.753021][ T8884] ? kasan_check_write+0x14/0x20 [ 365.757954][ T8884] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 365.763400][ T8884] ? do_syscall_64+0x26/0x680 [ 365.768084][ T8884] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.774718][ T8884] ? do_syscall_64+0x26/0x680 [ 365.779413][ T8884] __x64_sys_setsockopt+0xbe/0x150 [ 365.784516][ T8884] do_syscall_64+0xfd/0x680 [ 365.789024][ T8884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.794900][ T8884] RIP: 0033:0x45bdaa [ 365.798778][ T8884] Code: 49 89 ca b8 37 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ba 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 365.818631][ T8884] RSP: 002b:00007ffc968e2788 EFLAGS: 00000206 ORIG_RAX: 0000000000000036 18:44:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) 18:44:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 365.827040][ T8884] RAX: ffffffffffffffda RBX: 00007ffc968e27b0 RCX: 000000000045bdaa [ 365.835006][ T8884] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 365.842969][ T8884] RBP: 0000000000712e80 R08: 0000000000000408 R09: 0000000000004000 [ 365.850936][ T8884] R10: 0000000000711aa0 R11: 0000000000000206 R12: 0000000000000003 [ 365.858907][ T8884] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000711a40 [ 365.867910][ T8884] memory: usage 4288kB, limit 0kB, failcnt 12 [ 365.887609][ T8884] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 365.899712][ T8884] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 365.909626][ T8884] Memory cgroup stats for /syz5: cache:76KB rss:80KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:80KB inactive_file:128KB active_file:92KB unevictable:0KB [ 365.937691][ T8884] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=8884,uid=0 [ 365.956688][ T8884] Memory cgroup out of memory: Killed process 8884 (syz-executor.5) total-vm:72444kB, anon-rss:104kB, file-rss:35776kB, shmem-rss:0kB [ 365.971727][ T1042] oom_reaper: reaped process 8884 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 366.725079][T20542] chnl_net:caif_netlink_parms(): no params data found [ 366.908674][T20542] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.916397][T20542] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.931628][T20542] device bridge_slave_0 entered promiscuous mode [ 367.111378][T20542] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.118498][T20542] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.141441][T20542] device bridge_slave_1 entered promiscuous mode [ 367.305501][T20554] IPVS: ftp: loaded support on port[0] = 21 [ 367.306190][T20555] IPVS: ftp: loaded support on port[0] = 21 [ 367.338940][T20542] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 367.379181][T20542] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 367.526415][T20542] team0: Port device team_slave_0 added [ 367.563875][T20542] team0: Port device team_slave_1 added [ 367.724626][T20542] device hsr_slave_0 entered promiscuous mode [ 367.770742][T20542] device hsr_slave_1 entered promiscuous mode [ 368.036094][T20555] chnl_net:caif_netlink_parms(): no params data found [ 368.317959][T20554] chnl_net:caif_netlink_parms(): no params data found [ 368.332246][T20555] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.339418][T20555] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.350972][T20555] device bridge_slave_0 entered promiscuous mode [ 368.361051][T20555] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.368866][T20555] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.377662][T20555] device bridge_slave_1 entered promiscuous mode [ 368.395168][T20542] 8021q: adding VLAN 0 to HW filter on device bond0 [ 368.482042][T20542] 8021q: adding VLAN 0 to HW filter on device team0 [ 368.502407][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 368.511067][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 368.586915][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 368.601608][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 368.619126][ T2991] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.626284][ T2991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.659218][T20555] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 368.716662][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 368.735801][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 368.749981][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 368.768743][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.775885][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.793290][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 368.813310][T20554] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.826129][T20554] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.837863][T20554] device bridge_slave_0 entered promiscuous mode [ 368.856611][T20555] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 368.923537][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 368.941440][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 368.961696][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 368.981415][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 368.999198][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 369.009087][T20554] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.022709][T20554] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.034767][T20554] device bridge_slave_1 entered promiscuous mode [ 369.106166][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 369.125802][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 369.140063][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 369.162904][T20542] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 369.184271][T20542] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 369.273002][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 369.290081][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 369.308851][T20555] team0: Port device team_slave_0 added [ 369.326425][T20555] team0: Port device team_slave_1 added [ 369.386046][T20554] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 369.434779][T20554] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 369.457068][T20542] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 369.563244][T20555] device hsr_slave_0 entered promiscuous mode [ 369.589951][T20555] device hsr_slave_1 entered promiscuous mode [ 369.661422][T20554] team0: Port device team_slave_0 added [ 369.722769][T20554] team0: Port device team_slave_1 added [ 369.884787][T20554] device hsr_slave_0 entered promiscuous mode [ 369.940654][T20554] device hsr_slave_1 entered promiscuous mode [ 370.064674][T20564] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 370.075391][T20564] CPU: 0 PID: 20564 Comm: syz-executor.3 Not tainted 5.1.0+ #1 [ 370.083031][T20564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.093187][T20564] Call Trace: [ 370.096512][T20564] dump_stack+0x172/0x1f0 [ 370.100868][T20564] dump_header+0x10f/0xb6c [ 370.105303][T20564] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 370.111115][T20564] ? ___ratelimit+0x60/0x595 [ 370.115719][T20564] oom_kill_process.cold+0x10/0x15 [ 370.121108][T20564] out_of_memory+0x79a/0x1280 [ 370.125888][T20564] ? __sched_text_start+0x8/0x8 [ 370.130748][T20564] ? oom_killer_disable+0x280/0x280 [ 370.135974][T20564] mem_cgroup_out_of_memory+0x1ca/0x230 [ 370.141528][T20564] ? memcg_event_wake+0x230/0x230 [ 370.146545][T20564] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 370.152356][T20564] ? cgroup_file_notify+0x140/0x1b0 [ 370.157644][T20564] memory_max_write+0x169/0x300 [ 370.162488][T20564] ? mem_cgroup_write+0x360/0x360 [ 370.167506][T20564] ? lock_acquire+0x1ea/0x3f0 [ 370.172195][T20564] cgroup_file_write+0x241/0x790 [ 370.177161][T20564] ? mem_cgroup_write+0x360/0x360 [ 370.182201][T20564] ? init_and_link_css+0x860/0x860 [ 370.187313][T20564] ? init_and_link_css+0x860/0x860 [ 370.192642][T20564] kernfs_fop_write+0x2b8/0x480 [ 370.197494][T20564] __vfs_write+0x8a/0x110 [ 370.201825][T20564] ? kernfs_fop_open+0xd80/0xd80 [ 370.206762][T20564] vfs_write+0x20c/0x580 [ 370.211005][T20564] ksys_write+0x14f/0x290 [ 370.215340][T20564] ? __ia32_sys_read+0xb0/0xb0 [ 370.220110][T20564] __x64_sys_write+0x73/0xb0 [ 370.224703][T20564] do_syscall_64+0xfd/0x680 [ 370.229200][T20564] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 370.235102][T20564] RIP: 0033:0x459279 [ 370.239087][T20564] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 370.259583][T20564] RSP: 002b:00007fb3183e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 370.267991][T20564] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 370.275961][T20564] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 370.283953][T20564] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 370.291924][T20564] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3183e96d4 [ 370.299911][T20564] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 370.320539][T20564] memory: usage 8948kB, limit 0kB, failcnt 11 [ 370.326749][T20564] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 370.334540][T20564] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 370.342178][T20564] Memory cgroup stats for /syz3: cache:32KB rss:4260KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4260KB inactive_file:0KB active_file:0KB unevictable:0KB [ 370.363732][T20564] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=20563,uid=0 [ 370.386245][T20564] Memory cgroup out of memory: Killed process 20563 (syz-executor.3) total-vm:72580kB, anon-rss:4232kB, file-rss:35784kB, shmem-rss:0kB [ 370.403858][ T1042] oom_reaper: reaped process 20563 (syz-executor.3), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB [ 370.454404][T20555] 8021q: adding VLAN 0 to HW filter on device bond0 18:44:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) 18:44:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) 18:44:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 370.523677][T20542] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 370.535265][T20542] CPU: 0 PID: 20542 Comm: syz-executor.3 Not tainted 5.1.0+ #1 [ 370.542826][T20542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.552884][T20542] Call Trace: [ 370.556184][T20542] dump_stack+0x172/0x1f0 [ 370.560528][T20542] dump_header+0x10f/0xb6c [ 370.564966][T20542] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 370.570780][T20542] ? ___ratelimit+0x60/0x595 [ 370.575387][T20542] ? do_raw_spin_unlock+0x57/0x270 [ 370.580517][T20542] oom_kill_process.cold+0x10/0x15 [ 370.585639][T20542] out_of_memory+0x79a/0x1280 [ 370.590325][T20542] ? lock_downgrade+0x880/0x880 [ 370.595186][T20542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 370.601447][T20542] ? oom_killer_disable+0x280/0x280 [ 370.606653][T20542] ? find_held_lock+0x35/0x130 [ 370.611430][T20542] mem_cgroup_out_of_memory+0x1ca/0x230 [ 370.616979][T20542] ? memcg_event_wake+0x230/0x230 [ 370.622025][T20542] ? do_raw_spin_unlock+0x57/0x270 [ 370.627316][T20542] ? _raw_spin_unlock+0x2d/0x50 [ 370.632172][T20542] try_charge+0x102c/0x15c0 [ 370.636765][T20542] ? find_held_lock+0x35/0x130 [ 370.641544][T20542] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 370.647092][T20542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 370.653326][T20542] ? kasan_check_read+0x11/0x20 [ 370.658174][T20542] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 370.663703][T20542] mem_cgroup_try_charge+0x24d/0x5e0 [ 370.668995][T20542] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 370.674628][T20542] __handle_mm_fault+0x1e1a/0x3eb0 [ 370.679746][T20542] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 370.685288][T20542] ? find_held_lock+0x35/0x130 [ 370.690036][T20542] ? handle_mm_fault+0x322/0xb30 [ 370.694973][T20542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 370.701216][T20542] ? kasan_check_read+0x11/0x20 [ 370.706095][T20542] handle_mm_fault+0x43f/0xb30 [ 370.710875][T20542] __do_page_fault+0x5ef/0xda0 [ 370.715639][T20542] do_page_fault+0x71/0x57d [ 370.720131][T20542] ? page_fault+0x8/0x30 [ 370.724473][T20542] page_fault+0x1e/0x30 [ 370.728611][T20542] RIP: 0033:0x403672 [ 370.732585][T20542] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 29 86 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 49 3b 05 00 48 [ 370.752192][T20542] RSP: 002b:00007ffcd05daf90 EFLAGS: 00010246 [ 370.758265][T20542] RAX: 0000000000000000 RBX: 000000000005a536 RCX: 0000000000412e80 [ 370.766234][T20542] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffcd05dc0c0 [ 370.774202][T20542] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000000e80940 [ 370.782188][T20542] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcd05dc0c0 [ 370.790165][T20542] R13: 00007ffcd05dc0b0 R14: 0000000000000000 R15: 00007ffcd05dc0c0 [ 370.805772][T20542] memory: usage 4576kB, limit 0kB, failcnt 23 [ 370.817143][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 370.818879][T20542] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 370.825454][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 370.840481][T20542] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 370.847454][T20542] Memory cgroup stats for /syz3: cache:32KB rss:52KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:52KB inactive_file:0KB active_file:0KB unevictable:0KB [ 370.854733][T20555] 8021q: adding VLAN 0 to HW filter on device team0 [ 370.877007][T20542] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=20542,uid=0 [ 370.889542][T20554] 8021q: adding VLAN 0 to HW filter on device bond0 [ 370.902675][T20542] Memory cgroup out of memory: Killed process 20542 (syz-executor.3) total-vm:72448kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 370.918107][ T1042] oom_reaper: reaped process 20542 (syz-executor.3), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 370.981314][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 370.991586][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 371.009659][T19437] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.017051][T19437] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.037790][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 371.046392][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 371.063356][T20554] 8021q: adding VLAN 0 to HW filter on device team0 [ 371.536828][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 371.557164][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 371.570055][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 371.586851][ T2991] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.594001][ T2991] bridge0: port 2(bridge_slave_1) entered forwarding state 18:44:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 371.648933][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 371.781860][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 371.799953][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 18:44:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 371.832394][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 371.851633][T19437] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.858765][T19437] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.875495][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 371.906269][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 371.920106][T19437] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.927264][T19437] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.944995][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 371.958008][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 372.047263][T20568] IPVS: ftp: loaded support on port[0] = 21 [ 372.063055][T20567] IPVS: ftp: loaded support on port[0] = 21 [ 372.070790][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 372.078928][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 372.092852][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 372.103336][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 372.112123][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 372.121221][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 372.131028][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 372.139998][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 372.148952][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 372.157688][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 372.166368][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 372.175325][T19437] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 372.187129][T11304] device bridge_slave_1 left promiscuous mode [ 372.194206][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.246665][T11304] device bridge_slave_0 left promiscuous mode [ 372.260397][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.204090][T11304] device hsr_slave_1 left promiscuous mode [ 376.246463][T11304] device hsr_slave_0 left promiscuous mode [ 376.312970][T11304] team0 (unregistering): Port device team_slave_1 removed [ 376.336909][T11304] team0 (unregistering): Port device team_slave_0 removed [ 376.374739][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 376.437545][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 376.549876][T11304] bond0 (unregistering): Released all slaves [ 376.687914][T20555] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 376.704162][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 376.729106][T20554] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 376.741284][T20554] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 376.774520][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 376.785638][T20570] IPVS: ftp: loaded support on port[0] = 21 [ 376.801578][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 376.820384][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 376.828997][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 376.847430][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 376.858406][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 376.929408][T20555] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 376.938604][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 376.959728][T20554] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 377.549608][T20581] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 377.568108][T20581] CPU: 1 PID: 20581 Comm: syz-executor.1 Not tainted 5.1.0+ #1 [ 377.575673][T20581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.575681][T20581] Call Trace: [ 377.575704][T20581] dump_stack+0x172/0x1f0 [ 377.575728][T20581] dump_header+0x10f/0xb6c [ 377.575757][T20581] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 377.575773][T20581] ? ___ratelimit+0x60/0x595 [ 377.575790][T20581] ? do_raw_spin_unlock+0x57/0x270 [ 377.575811][T20581] oom_kill_process.cold+0x10/0x15 [ 377.575829][T20581] out_of_memory+0x79a/0x1280 [ 377.575846][T20581] ? __sched_text_start+0x8/0x8 [ 377.575863][T20581] ? oom_killer_disable+0x280/0x280 [ 377.575888][T20581] mem_cgroup_out_of_memory+0x1ca/0x230 [ 377.575911][T20581] ? memcg_event_wake+0x230/0x230 [ 377.603798][T20581] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 377.603820][T20581] ? cgroup_file_notify+0x140/0x1b0 [ 377.613509][T20581] memory_max_write+0x169/0x300 [ 377.628113][T20581] ? mem_cgroup_write+0x360/0x360 [ 377.628133][T20581] ? cgroup_file_write+0x86/0x790 [ 377.628152][T20581] cgroup_file_write+0x241/0x790 [ 377.643887][T20581] ? mem_cgroup_write+0x360/0x360 [ 377.643904][T20581] ? init_and_link_css+0x860/0x860 [ 377.643924][T20581] ? init_and_link_css+0x860/0x860 [ 377.664769][T20581] kernfs_fop_write+0x2b8/0x480 [ 377.664793][T20581] __vfs_write+0x8a/0x110 [ 377.664812][T20581] ? kernfs_fop_open+0xd80/0xd80 [ 377.674839][T20581] vfs_write+0x20c/0x580 [ 377.674857][T20581] ksys_write+0x14f/0x290 [ 377.674872][T20581] ? __ia32_sys_read+0xb0/0xb0 [ 377.674890][T20581] ? do_syscall_64+0x26/0x680 [ 377.674908][T20581] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.674928][T20581] ? do_syscall_64+0x26/0x680 [ 377.685045][T20581] __x64_sys_write+0x73/0xb0 [ 377.685064][T20581] do_syscall_64+0xfd/0x680 [ 377.685089][T20581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.704269][T20581] RIP: 0033:0x459279 [ 377.704287][T20581] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 377.704295][T20581] RSP: 002b:00007fad42afcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 377.717610][T20581] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 377.717620][T20581] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 377.717628][T20581] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 377.717637][T20581] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fad42afd6d4 [ 377.717645][T20581] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 377.728688][T20581] memory: usage 7852kB, limit 0kB, failcnt 17 [ 377.750374][T20581] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 377.766441][T20568] chnl_net:caif_netlink_parms(): no params data found [ 377.822374][T20581] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 377.860345][T20581] Memory cgroup stats for /syz1: cache:28KB rss:4216KB rss_huge:4096KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4216KB inactive_file:148KB active_file:64KB unevictable:0KB [ 377.885842][T20581] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=20579,uid=0 [ 377.920335][T20581] Memory cgroup out of memory: Killed process 20579 (syz-executor.1) total-vm:72580kB, anon-rss:4228kB, file-rss:35784kB, shmem-rss:0kB [ 377.970976][T20567] chnl_net:caif_netlink_parms(): no params data found [ 377.990564][T20587] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 377.991762][ T1042] oom_reaper: reaped process 20579 (syz-executor.1), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 378.007195][T20587] CPU: 0 PID: 20587 Comm: syz-executor.2 Not tainted 5.1.0+ #1 [ 378.019625][T20587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.029687][T20587] Call Trace: [ 378.032989][T20587] dump_stack+0x172/0x1f0 [ 378.033010][T20587] dump_header+0x10f/0xb6c [ 378.033030][T20587] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 378.033044][T20587] ? ___ratelimit+0x60/0x595 [ 378.033058][T20587] ? do_raw_spin_unlock+0x57/0x270 [ 378.033076][T20587] oom_kill_process.cold+0x10/0x15 [ 378.033094][T20587] out_of_memory+0x79a/0x1280 [ 378.033114][T20587] ? oom_killer_disable+0x280/0x280 [ 378.052208][T20587] ? cgroup_file_notify+0x140/0x1b0 [ 378.052251][T20587] mem_cgroup_out_of_memory+0x1ca/0x230 [ 378.052270][T20587] ? memcg_event_wake+0x230/0x230 [ 378.062480][T20587] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 378.062498][T20587] ? cgroup_file_notify+0x140/0x1b0 [ 378.062518][T20587] memory_max_write+0x169/0x300 [ 378.072377][T20587] ? mem_cgroup_write+0x360/0x360 [ 378.072392][T20587] ? lock_acquire+0x16f/0x3f0 [ 378.072405][T20587] ? kernfs_fop_write+0x227/0x480 [ 378.072425][T20587] cgroup_file_write+0x241/0x790 [ 378.072441][T20587] ? mem_cgroup_write+0x360/0x360 [ 378.072460][T20587] ? init_and_link_css+0x860/0x860 [ 378.133881][T20587] ? init_and_link_css+0x860/0x860 [ 378.139085][T20587] kernfs_fop_write+0x2b8/0x480 [ 378.143952][T20587] __vfs_write+0x8a/0x110 [ 378.148283][T20587] ? kernfs_fop_open+0xd80/0xd80 [ 378.153221][T20587] vfs_write+0x20c/0x580 [ 378.157487][T20587] ksys_write+0x14f/0x290 [ 378.161816][T20587] ? __ia32_sys_read+0xb0/0xb0 [ 378.166580][T20587] ? do_syscall_64+0x26/0x680 [ 378.171266][T20587] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 378.177331][T20587] ? do_syscall_64+0x26/0x680 [ 378.182010][T20587] __x64_sys_write+0x73/0xb0 [ 378.186691][T20587] do_syscall_64+0xfd/0x680 [ 378.191204][T20587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 378.197104][T20587] RIP: 0033:0x459279 [ 378.200995][T20587] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 378.220603][T20587] RSP: 002b:00007fdaa538fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 378.229306][T20587] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 378.237286][T20587] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 378.245271][T20587] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 378.253261][T20587] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdaa53906d4 [ 378.261268][T20587] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 378.525467][T20570] chnl_net:caif_netlink_parms(): no params data found [ 378.646627][T20568] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.670982][T20568] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.688220][T20568] device bridge_slave_0 entered promiscuous mode [ 378.702747][T20587] memory: usage 8456kB, limit 0kB, failcnt 13 [ 378.727614][T20567] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.740634][T20567] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.747923][T20587] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 378.773338][T20587] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 378.783867][T20567] device bridge_slave_0 entered promiscuous mode [ 378.803785][T20587] Memory cgroup stats for /syz2: cache:232KB rss:4156KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4156KB inactive_file:132KB active_file:132KB unevictable:0KB [ 378.834105][T20568] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.845885][T20568] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.873269][T20568] device bridge_slave_1 entered promiscuous mode [ 378.908566][T20567] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.919424][T20587] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=20583,uid=0 [ 378.939096][T20567] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.961559][T20567] device bridge_slave_1 entered promiscuous mode [ 378.972708][T20587] Memory cgroup out of memory: Killed process 20583 (syz-executor.2) total-vm:72712kB, anon-rss:4240kB, file-rss:35776kB, shmem-rss:0kB [ 378.989257][ T1042] oom_reaper: reaped process 20583 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 379.000288][T20554] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 379.000305][T20554] CPU: 0 PID: 20554 Comm: syz-executor.1 Not tainted 5.1.0+ #1 [ 379.000312][T20554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.000317][T20554] Call Trace: [ 379.000340][T20554] dump_stack+0x172/0x1f0 [ 379.000359][T20554] dump_header+0x10f/0xb6c [ 379.000377][T20554] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 379.000389][T20554] ? ___ratelimit+0x60/0x595 [ 379.000402][T20554] ? do_raw_spin_unlock+0x57/0x270 [ 379.000422][T20554] oom_kill_process.cold+0x10/0x15 [ 379.036486][T20554] out_of_memory+0x79a/0x1280 [ 379.036514][T20554] ? oom_killer_disable+0x280/0x280 [ 379.061795][T20554] ? find_held_lock+0x35/0x130 [ 379.061820][T20554] mem_cgroup_out_of_memory+0x1ca/0x230 [ 379.061833][T20554] ? memcg_event_wake+0x230/0x230 [ 379.061853][T20554] ? do_raw_spin_unlock+0x57/0x270 [ 379.061870][T20554] ? _raw_spin_unlock+0x2d/0x50 [ 379.061886][T20554] try_charge+0x102c/0x15c0 [ 379.061898][T20554] ? find_held_lock+0x35/0x130 [ 379.061920][T20554] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 379.061936][T20554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.061952][T20554] ? kasan_check_read+0x11/0x20 [ 379.061971][T20554] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 379.092279][T20554] mem_cgroup_try_charge+0x24d/0x5e0 [ 379.101624][T20554] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 379.101641][T20554] wp_page_copy+0x416/0x1770 [ 379.101654][T20554] ? do_wp_page+0x5d0/0x16c0 [ 379.101673][T20554] ? pmd_pfn+0x1d0/0x1d0 [ 379.101690][T20554] ? lock_downgrade+0x880/0x880 [ 379.101703][T20554] ? swp_swapcount+0x540/0x540 [ 379.101718][T20554] ? kasan_check_read+0x11/0x20 [ 379.101739][T20554] ? do_raw_spin_unlock+0x57/0x270 [ 379.123125][T20554] do_wp_page+0x5d8/0x16c0 [ 379.146659][T20554] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 379.165149][T20554] __handle_mm_fault+0x22e3/0x3eb0 [ 379.165169][T20554] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 379.185087][T20554] ? find_held_lock+0x35/0x130 [ 379.200883][T20554] ? handle_mm_fault+0x322/0xb30 [ 379.205867][T20554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.212148][T20554] ? kasan_check_read+0x11/0x20 [ 379.212174][T20554] handle_mm_fault+0x43f/0xb30 [ 379.221807][T20554] __do_page_fault+0x5ef/0xda0 [ 379.221826][T20554] do_page_fault+0x71/0x57d [ 379.221838][T20554] ? page_fault+0x8/0x30 [ 379.221849][T20554] page_fault+0x1e/0x30 [ 379.221860][T20554] RIP: 0033:0x430356 [ 379.221874][T20554] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 379.221881][T20554] RSP: 002b:00007ffff4fde470 EFLAGS: 00010206 [ 379.221891][T20554] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 379.221898][T20554] RDX: 00000000024c4930 RSI: 00000000024cc970 RDI: 0000000000000003 [ 379.221906][T20554] RBP: 0000000000008041 R08: 0000000000000001 R09: 00000000024c3940 [ 379.221914][T20554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 379.221922][T20554] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 379.226123][T20554] memory: usage 3476kB, limit 0kB, failcnt 25 [ 379.264158][T20554] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 379.264175][T20554] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 379.337913][T20554] Memory cgroup stats for /syz1: cache:28KB rss:52KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:52KB inactive_file:148KB active_file:64KB unevictable:0KB [ 379.359872][T20554] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=20554,uid=0 [ 379.377090][T20570] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.384936][T20554] Memory cgroup out of memory: Killed process 20554 (syz-executor.1) total-vm:72448kB, anon-rss:68kB, file-rss:34824kB, shmem-rss:0kB [ 379.390398][T20570] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.407227][ T1042] oom_reaper: reaped process 20554 (syz-executor.1), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 379.418377][T20555] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 379.440316][T20555] CPU: 1 PID: 20555 Comm: syz-executor.2 Not tainted 5.1.0+ #1 [ 379.447917][T20555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.457976][T20555] Call Trace: [ 379.458004][T20555] dump_stack+0x172/0x1f0 [ 379.462388][T20570] device bridge_slave_0 entered promiscuous mode [ 379.465614][T20555] dump_header+0x10f/0xb6c [ 379.476343][T20555] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 379.482172][T20555] ? ___ratelimit+0x60/0x595 [ 379.486783][T20555] ? do_raw_spin_unlock+0x57/0x270 [ 379.492262][T20555] oom_kill_process.cold+0x10/0x15 [ 379.492278][T20555] out_of_memory+0x79a/0x1280 [ 379.492297][T20555] ? oom_killer_disable+0x280/0x280 [ 379.492316][T20555] ? find_held_lock+0x35/0x130 [ 379.502221][T20555] mem_cgroup_out_of_memory+0x1ca/0x230 [ 379.502245][T20555] ? memcg_event_wake+0x230/0x230 [ 379.502272][T20555] ? do_raw_spin_unlock+0x57/0x270 [ 379.512248][T20555] ? _raw_spin_unlock+0x2d/0x50 [ 379.512267][T20555] try_charge+0x102c/0x15c0 [ 379.512280][T20555] ? find_held_lock+0x35/0x130 [ 379.512300][T20555] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 379.522864][T20555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.522879][T20555] ? kasan_check_read+0x11/0x20 [ 379.522899][T20555] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 379.522918][T20555] mem_cgroup_try_charge+0x24d/0x5e0 [ 379.532881][T20555] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 379.532899][T20555] wp_page_copy+0x416/0x1770 [ 379.532919][T20555] ? do_wp_page+0x5d0/0x16c0 [ 379.542171][T20555] ? pmd_pfn+0x1d0/0x1d0 [ 379.542188][T20555] ? lock_downgrade+0x880/0x880 [ 379.542203][T20555] ? swp_swapcount+0x540/0x540 [ 379.542222][T20555] ? kasan_check_read+0x11/0x20 [ 379.554003][T20555] ? do_raw_spin_unlock+0x57/0x270 [ 379.554021][T20555] do_wp_page+0x5d8/0x16c0 [ 379.554042][T20555] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 379.554063][T20555] __handle_mm_fault+0x22e3/0x3eb0 [ 379.564539][T20555] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 379.564552][T20555] ? find_held_lock+0x35/0x130 [ 379.564564][T20555] ? handle_mm_fault+0x322/0xb30 [ 379.564586][T20555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.575855][T20555] ? kasan_check_read+0x11/0x20 [ 379.585081][T20555] handle_mm_fault+0x43f/0xb30 [ 379.594170][T20555] __do_page_fault+0x5ef/0xda0 [ 379.594189][T20555] do_page_fault+0x71/0x57d [ 379.594203][T20555] ? page_fault+0x8/0x30 [ 379.594220][T20555] page_fault+0x1e/0x30 [ 379.603828][T20555] RIP: 0033:0x403672 [ 379.613356][T20555] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 29 86 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 49 3b 05 00 48 [ 379.613363][T20555] RSP: 002b:00007ffebe554bf0 EFLAGS: 00010246 [ 379.613373][T20555] RAX: 0000000000000000 RBX: 000000000005c736 RCX: 0000000000412e80 [ 379.613380][T20555] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffebe555d20 [ 379.613387][T20555] RBP: 0000000000000002 R08: 0000000000000001 R09: 00000000018bf940 [ 379.613395][T20555] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffebe555d20 [ 379.613410][T20555] R13: 00007ffebe555d10 R14: 0000000000000000 R15: 00007ffebe555d20 [ 379.750775][T20555] memory: usage 4008kB, limit 0kB, failcnt 25 [ 379.756985][T20555] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 379.775598][T20555] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 379.787686][T20555] Memory cgroup stats for /syz2: cache:232KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:56KB inactive_file:132KB active_file:132KB unevictable:0KB [ 379.819892][T20555] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=20555,uid=0 [ 379.835523][T20555] Memory cgroup out of memory: Killed process 20555 (syz-executor.2) total-vm:72448kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 379.860743][ T1042] oom_reaper: reaped process 20555 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 379.874935][T20570] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.882930][T20570] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.901350][T20570] device bridge_slave_1 entered promiscuous mode [ 380.392833][T20568] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 380.798964][T20567] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 380.828109][T20568] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 380.845855][T20567] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 380.872537][T20570] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 380.944586][T20570] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 381.009753][T20567] team0: Port device team_slave_0 added [ 381.019818][T20568] team0: Port device team_slave_0 added [ 381.038684][T20568] team0: Port device team_slave_1 added [ 381.069092][T20567] team0: Port device team_slave_1 added [ 381.122030][T20570] team0: Port device team_slave_0 added [ 381.142874][T20570] team0: Port device team_slave_1 added [ 381.293783][T20568] device hsr_slave_0 entered promiscuous mode [ 381.330770][T20568] device hsr_slave_1 entered promiscuous mode [ 381.435044][T20567] device hsr_slave_0 entered promiscuous mode [ 381.490690][T20567] device hsr_slave_1 entered promiscuous mode [ 381.593537][T20570] device hsr_slave_0 entered promiscuous mode [ 381.620678][T20570] device hsr_slave_1 entered promiscuous mode [ 381.837610][T20568] 8021q: adding VLAN 0 to HW filter on device bond0 [ 381.870804][T20570] 8021q: adding VLAN 0 to HW filter on device bond0 [ 381.888067][T20567] 8021q: adding VLAN 0 to HW filter on device bond0 [ 381.912791][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 381.951673][T20567] 8021q: adding VLAN 0 to HW filter on device team0 [ 381.968143][T20570] 8021q: adding VLAN 0 to HW filter on device team0 [ 381.979586][T20568] 8021q: adding VLAN 0 to HW filter on device team0 [ 381.988123][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 382.001259][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 382.009217][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 382.017651][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 382.026416][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 382.046618][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 383.921940][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 383.940868][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 383.949558][ T3484] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.956735][ T3484] bridge0: port 1(bridge_slave_0) entered forwarding state [ 383.965524][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 383.974496][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 383.983668][ T3484] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.990810][ T3484] bridge0: port 1(bridge_slave_0) entered forwarding state [ 384.001119][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 384.009919][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 384.018924][ T3484] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.026069][ T3484] bridge0: port 1(bridge_slave_0) entered forwarding state [ 384.034480][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 384.043377][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 384.052444][ T3484] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.059543][ T3484] bridge0: port 2(bridge_slave_1) entered forwarding state [ 384.082077][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 384.091037][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 384.099859][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 384.108636][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 384.119446][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 384.129452][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 384.154316][ T3484] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.161687][ T3484] bridge0: port 2(bridge_slave_1) entered forwarding state [ 384.180923][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 384.189936][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 384.226130][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 384.235272][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 384.254558][ T3484] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.261814][ T3484] bridge0: port 2(bridge_slave_1) entered forwarding state [ 385.183657][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 385.201836][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 385.221076][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 385.240764][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 385.249755][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 385.269953][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 385.301398][T20568] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 385.321083][T20568] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 386.307794][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 386.318938][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 386.329481][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 386.338618][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 386.348573][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 386.357696][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 386.366521][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 386.375847][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 386.411788][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 386.419585][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 386.439259][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 386.460703][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 386.469419][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 386.478952][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 386.488340][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 386.497636][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 386.506806][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 386.515925][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 386.524767][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 386.533703][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 387.457349][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 387.465684][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 387.475175][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 387.486223][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 387.508217][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 387.543138][T20570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 387.594804][T20568] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 388.736341][T20567] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 388.774801][T20570] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 390.093772][T20604] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 390.107409][T20604] CPU: 0 PID: 20604 Comm: syz-executor.5 Not tainted 5.1.0+ #1 [ 390.115177][T20604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.125430][T20604] Call Trace: [ 390.128758][T20604] dump_stack+0x172/0x1f0 [ 390.133119][T20604] dump_header+0x10f/0xb6c [ 390.137582][T20604] oom_kill_process.cold+0x10/0x15 [ 390.142716][T20604] out_of_memory+0x79a/0x1280 [ 390.147456][T20604] ? __sched_text_start+0x8/0x8 [ 390.152329][T20604] ? oom_killer_disable+0x280/0x280 [ 390.157642][T20604] mem_cgroup_out_of_memory+0x1ca/0x230 [ 390.163213][T20604] ? memcg_event_wake+0x230/0x230 [ 390.168291][T20604] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 390.174123][T20604] ? cgroup_file_notify+0x140/0x1b0 [ 390.179344][T20604] memory_max_write+0x169/0x300 [ 390.184223][T20604] ? mem_cgroup_write+0x360/0x360 [ 390.189305][T20604] ? lock_acquire+0x16f/0x3f0 [ 390.194004][T20604] ? kernfs_fop_write+0x227/0x480 [ 390.199051][T20604] cgroup_file_write+0x241/0x790 [ 390.204021][T20604] ? mem_cgroup_write+0x360/0x360 [ 390.209065][T20604] ? init_and_link_css+0x860/0x860 [ 390.214290][T20604] ? init_and_link_css+0x860/0x860 [ 390.219416][T20604] kernfs_fop_write+0x2b8/0x480 [ 390.224291][T20604] __vfs_write+0x8a/0x110 [ 390.228631][T20604] ? kernfs_fop_open+0xd80/0xd80 [ 390.233585][T20604] vfs_write+0x20c/0x580 [ 390.237855][T20604] ksys_write+0x14f/0x290 [ 390.242201][T20604] ? __ia32_sys_read+0xb0/0xb0 [ 390.247101][T20604] ? do_syscall_64+0x26/0x680 [ 390.251980][T20604] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 390.258067][T20604] ? do_syscall_64+0x26/0x680 [ 390.262767][T20604] __x64_sys_write+0x73/0xb0 [ 390.267372][T20604] do_syscall_64+0xfd/0x680 [ 390.271903][T20604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 390.277803][T20604] RIP: 0033:0x459279 [ 390.281708][T20604] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 390.301320][T20604] RSP: 002b:00007f44b8f83c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 390.309745][T20604] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 390.317737][T20604] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 390.325728][T20604] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 390.333716][T20604] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f44b8f846d4 [ 390.341703][T20604] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 390.368093][T20604] memory: usage 8232kB, limit 0kB, failcnt 13 [ 390.374823][T20604] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 390.385013][T20604] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 390.395201][T20604] Memory cgroup stats for /syz5: cache:76KB rss:4152KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4152KB inactive_file:128KB active_file:92KB unevictable:0KB [ 390.417884][T20604] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=20601,uid=0 [ 390.434521][T20604] Memory cgroup out of memory: Killed process 20601 (syz-executor.5) total-vm:72580kB, anon-rss:4232kB, file-rss:35788kB, shmem-rss:0kB [ 390.452316][ T1042] oom_reaper: reaped process 20601 (syz-executor.5), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 390.975808][T20568] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 391.014857][T20568] CPU: 1 PID: 20568 Comm: syz-executor.5 Not tainted 5.1.0+ #1 [ 391.022440][T20568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.032500][T20568] Call Trace: [ 391.035806][T20568] dump_stack+0x172/0x1f0 [ 391.040154][T20568] dump_header+0x10f/0xb6c [ 391.044588][T20568] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 391.050410][T20568] ? ___ratelimit+0x60/0x595 [ 391.055013][T20568] ? do_raw_spin_unlock+0x57/0x270 [ 391.060146][T20568] oom_kill_process.cold+0x10/0x15 [ 391.065284][T20568] out_of_memory+0x79a/0x1280 [ 391.069980][T20568] ? lock_downgrade+0x880/0x880 [ 391.074859][T20568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.081124][T20568] ? oom_killer_disable+0x280/0x280 [ 391.086344][T20568] ? find_held_lock+0x35/0x130 [ 391.091131][T20568] mem_cgroup_out_of_memory+0x1ca/0x230 [ 391.096688][T20568] ? memcg_event_wake+0x230/0x230 [ 391.101733][T20568] ? do_raw_spin_unlock+0x57/0x270 [ 391.106865][T20568] ? _raw_spin_unlock+0x2d/0x50 [ 391.111733][T20568] try_charge+0x102c/0x15c0 [ 391.116264][T20568] ? find_held_lock+0x35/0x130 [ 391.121139][T20568] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 391.127176][T20568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.133521][T20568] ? kasan_check_read+0x11/0x20 [ 391.138401][T20568] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 391.144098][T20568] mem_cgroup_try_charge+0x24d/0x5e0 [ 391.149412][T20568] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 391.155158][T20568] wp_page_copy+0x416/0x1770 [ 391.159769][T20568] ? do_wp_page+0x5d0/0x16c0 [ 391.164379][T20568] ? pmd_pfn+0x1d0/0x1d0 [ 391.168634][T20568] ? lock_downgrade+0x880/0x880 [ 391.173598][T20568] ? swp_swapcount+0x540/0x540 [ 391.178376][T20568] ? kasan_check_read+0x11/0x20 [ 391.183251][T20568] ? do_raw_spin_unlock+0x57/0x270 [ 391.188376][T20568] do_wp_page+0x5d8/0x16c0 [ 391.192808][T20568] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 391.198191][T20568] __handle_mm_fault+0x22e3/0x3eb0 [ 391.203316][T20568] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 391.208870][T20568] ? find_held_lock+0x35/0x130 [ 391.213660][T20568] ? handle_mm_fault+0x322/0xb30 [ 391.218615][T20568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.224860][T20568] ? kasan_check_read+0x11/0x20 [ 391.229805][T20568] handle_mm_fault+0x43f/0xb30 [ 391.234581][T20568] __do_page_fault+0x5ef/0xda0 [ 391.239357][T20568] do_page_fault+0x71/0x57d [ 391.243874][T20568] ? page_fault+0x8/0x30 [ 391.248308][T20568] page_fault+0x1e/0x30 [ 391.252578][T20568] RIP: 0033:0x403672 [ 391.256570][T20568] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 29 86 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 49 3b 05 00 48 [ 391.276216][T20568] RSP: 002b:00007ffe47689de0 EFLAGS: 00010246 [ 391.282322][T20568] RAX: 0000000000000000 RBX: 000000000005f379 RCX: 0000000000412e80 [ 391.290302][T20568] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffe4768af10 [ 391.298301][T20568] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000002870940 [ 391.306374][T20568] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe4768af10 [ 391.314354][T20568] R13: 00007ffe4768af00 R14: 0000000000000000 R15: 00007ffe4768af10 [ 391.354183][T20568] memory: usage 3856kB, limit 0kB, failcnt 21 [ 391.360411][T20568] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 391.367883][T20568] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 391.375604][T20568] Memory cgroup stats for /syz5: cache:76KB rss:0KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:128KB active_file:92KB unevictable:0KB [ 391.411230][T20568] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=20568,uid=0 [ 391.458372][T20568] Memory cgroup out of memory: Killed process 20568 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 391.474221][ T1042] oom_reaper: reaped process 20568 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 391.486185][T20610] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 391.538699][T20610] CPU: 0 PID: 20610 Comm: syz-executor.3 Not tainted 5.1.0+ #1 [ 391.546285][T20610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.556354][T20610] Call Trace: [ 391.559667][T20610] dump_stack+0x172/0x1f0 [ 391.564022][T20610] dump_header+0x10f/0xb6c [ 391.568462][T20610] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 391.574287][T20610] ? ___ratelimit+0x60/0x595 [ 391.578892][T20610] ? do_raw_spin_unlock+0x57/0x270 [ 391.584022][T20610] oom_kill_process.cold+0x10/0x15 [ 391.589156][T20610] out_of_memory+0x79a/0x1280 [ 391.593891][T20610] ? oom_killer_disable+0x280/0x280 [ 391.599117][T20610] mem_cgroup_out_of_memory+0x1ca/0x230 [ 391.604680][T20610] ? memcg_event_wake+0x230/0x230 [ 391.609741][T20610] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 391.615562][T20610] ? cgroup_file_notify+0x140/0x1b0 [ 391.620775][T20610] memory_max_write+0x169/0x300 [ 391.625811][T20610] ? retint_kernel+0x2b/0x2b [ 391.630449][T20610] ? mem_cgroup_write+0x360/0x360 [ 391.635498][T20610] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 391.640981][T20610] cgroup_file_write+0x241/0x790 [ 391.646024][T20610] ? mem_cgroup_write+0x360/0x360 [ 391.651156][T20610] ? init_and_link_css+0x860/0x860 [ 391.656374][T20610] ? cgroup_file_write+0x1f/0x790 [ 391.661419][T20610] ? init_and_link_css+0x860/0x860 [ 391.666557][T20610] kernfs_fop_write+0x2b8/0x480 [ 391.671454][T20610] __vfs_write+0x8a/0x110 [ 391.675795][T20610] ? kernfs_fop_open+0xd80/0xd80 [ 391.680750][T20610] vfs_write+0x20c/0x580 [ 391.685037][T20610] ksys_write+0x14f/0x290 [ 391.689404][T20610] ? __ia32_sys_read+0xb0/0xb0 [ 391.694191][T20610] ? do_syscall_64+0x26/0x680 [ 391.698893][T20610] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.704985][T20610] ? do_syscall_64+0x26/0x680 [ 391.709691][T20610] __x64_sys_write+0x73/0xb0 [ 391.714301][T20610] do_syscall_64+0xfd/0x680 [ 391.719005][T20610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.724907][T20610] RIP: 0033:0x459279 [ 391.728811][T20610] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 391.748453][T20610] RSP: 002b:00007fa3dc61ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 391.756884][T20610] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 391.764904][T20610] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 391.772886][T20610] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 391.780862][T20610] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa3dc61b6d4 [ 391.788844][T20610] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 391.850595][T20610] memory: usage 8740kB, limit 0kB, failcnt 24 [ 391.858580][T20610] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 391.890780][T20610] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 391.910332][T20610] Memory cgroup stats for /syz3: cache:32KB rss:4260KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4260KB inactive_file:0KB active_file:0KB unevictable:0KB [ 391.933072][T20610] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=20605,uid=0 [ 391.952917][T20610] Memory cgroup out of memory: Killed process 20610 (syz-executor.3) total-vm:72844kB, anon-rss:4248kB, file-rss:35816kB, shmem-rss:0kB [ 391.971786][ T1042] oom_reaper: reaped process 20610 (syz-executor.3), now anon-rss:0kB, file-rss:34856kB, shmem-rss:0kB [ 391.980581][T20567] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 391.999326][T20567] CPU: 1 PID: 20567 Comm: syz-executor.4 Not tainted 5.1.0+ #1 [ 392.006895][T20567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.016971][T20567] Call Trace: [ 392.020286][T20567] dump_stack+0x172/0x1f0 [ 392.024637][T20567] dump_header+0x10f/0xb6c [ 392.029073][T20567] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 392.034890][T20567] ? ___ratelimit+0x60/0x595 [ 392.039517][T20567] ? do_raw_spin_unlock+0x57/0x270 [ 392.044643][T20567] oom_kill_process.cold+0x10/0x15 [ 392.049784][T20567] out_of_memory+0x79a/0x1280 [ 392.054484][T20567] ? oom_killer_disable+0x280/0x280 [ 392.059690][T20567] ? find_held_lock+0x35/0x130 [ 392.064563][T20567] mem_cgroup_out_of_memory+0x1ca/0x230 [ 392.070124][T20567] ? memcg_event_wake+0x230/0x230 [ 392.075175][T20567] ? do_raw_spin_unlock+0x57/0x270 [ 392.080307][T20567] ? _raw_spin_unlock+0x2d/0x50 [ 392.085175][T20567] try_charge+0x102c/0x15c0 [ 392.089687][T20567] ? find_held_lock+0x35/0x130 [ 392.094476][T20567] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 392.100048][T20567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.106307][T20567] ? kasan_check_read+0x11/0x20 [ 392.111177][T20567] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 392.116742][T20567] mem_cgroup_try_charge+0x24d/0x5e0 [ 392.122060][T20567] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 392.127721][T20567] wp_page_copy+0x416/0x1770 [ 392.132338][T20567] ? do_wp_page+0x5d0/0x16c0 [ 392.136943][T20567] ? pmd_pfn+0x1d0/0x1d0 [ 392.141196][T20567] ? lock_downgrade+0x880/0x880 [ 392.146061][T20567] ? swp_swapcount+0x540/0x540 [ 392.150831][T20567] ? kasan_check_read+0x11/0x20 [ 392.155777][T20567] ? do_raw_spin_unlock+0x57/0x270 [ 392.160934][T20567] do_wp_page+0x5d8/0x16c0 [ 392.165456][T20567] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 392.170850][T20567] __handle_mm_fault+0x22e3/0x3eb0 [ 392.175969][T20567] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 392.181522][T20567] ? find_held_lock+0x35/0x130 [ 392.186298][T20567] ? handle_mm_fault+0x322/0xb30 [ 392.191244][T20567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.197576][T20567] ? kasan_check_read+0x11/0x20 [ 392.202411][T20567] handle_mm_fault+0x43f/0xb30 [ 392.207158][T20567] __do_page_fault+0x5ef/0xda0 [ 392.211911][T20567] do_page_fault+0x71/0x57d [ 392.216479][T20567] ? page_fault+0x8/0x30 [ 392.220811][T20567] page_fault+0x1e/0x30 [ 392.224968][T20567] RIP: 0033:0x430356 [ 392.228874][T20567] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 392.248556][T20567] RSP: 002b:00007ffdb198f860 EFLAGS: 00010206 [ 392.254610][T20567] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 392.262568][T20567] RDX: 00000000023a5930 RSI: 00000000023ad970 RDI: 0000000000000003 [ 392.270550][T20567] RBP: 0000000000008041 R08: 0000000000000001 R09: 00000000023a4940 [ 392.278524][T20567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 392.286511][T20567] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 392.296426][T20567] memory: usage 3232kB, limit 0kB, failcnt 19 [ 392.302620][T20567] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 392.302630][T20567] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 392.302636][T20567] Memory cgroup stats for /syz4: cache:48KB rss:136KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:60KB inactive_file:112KB active_file:0KB unevictable:0KB [ 392.302710][T20567] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=20567,uid=0 [ 392.302806][T20567] Memory cgroup out of memory: Killed process 20567 (syz-executor.4) total-vm:72448kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 392.390084][T20570] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 392.410364][T20570] CPU: 1 PID: 20570 Comm: syz-executor.3 Not tainted 5.1.0+ #1 [ 392.417937][T20570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.428123][T20570] Call Trace: [ 392.428149][T20570] dump_stack+0x172/0x1f0 [ 392.428167][T20570] dump_header+0x10f/0xb6c [ 392.428184][T20570] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 392.428197][T20570] ? ___ratelimit+0x60/0x595 [ 392.428211][T20570] ? do_raw_spin_unlock+0x57/0x270 [ 392.428229][T20570] oom_kill_process.cold+0x10/0x15 [ 392.428255][T20570] out_of_memory+0x79a/0x1280 [ 392.428270][T20570] ? lock_downgrade+0x880/0x880 [ 392.428284][T20570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.428300][T20570] ? oom_killer_disable+0x280/0x280 [ 392.428311][T20570] ? find_held_lock+0x35/0x130 [ 392.428334][T20570] mem_cgroup_out_of_memory+0x1ca/0x230 [ 392.428347][T20570] ? memcg_event_wake+0x230/0x230 [ 392.428366][T20570] ? do_raw_spin_unlock+0x57/0x270 [ 392.428383][T20570] ? _raw_spin_unlock+0x2d/0x50 [ 392.428403][T20570] try_charge+0x102c/0x15c0 [ 392.436021][T20570] ? find_held_lock+0x35/0x130 [ 392.446225][T20570] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 392.455933][T20570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.465881][T20570] ? kasan_check_read+0x11/0x20 [ 392.476983][T20570] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 392.486932][T20570] mem_cgroup_try_charge+0x24d/0x5e0 [ 392.497512][T20570] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 392.507549][T20570] wp_page_copy+0x416/0x1770 [ 392.516893][T20570] ? do_wp_page+0x5d0/0x16c0 [ 392.528659][T20570] ? pmd_pfn+0x1d0/0x1d0 [ 392.539047][T20570] ? lock_downgrade+0x880/0x880 [ 392.549946][T20570] ? swp_swapcount+0x540/0x540 [ 392.559125][T20570] ? kasan_check_read+0x11/0x20 [ 392.568206][T20570] ? do_raw_spin_unlock+0x57/0x270 [ 392.577809][T20570] do_wp_page+0x5d8/0x16c0 [ 392.587435][T20570] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 392.587456][T20570] __handle_mm_fault+0x22e3/0x3eb0 [ 392.598226][T20570] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 392.603791][T20570] ? find_held_lock+0x35/0x130 [ 392.603805][T20570] ? handle_mm_fault+0x322/0xb30 [ 392.603826][T20570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.603841][T20570] ? kasan_check_read+0x11/0x20 [ 392.603863][T20570] handle_mm_fault+0x43f/0xb30 [ 392.613559][T20570] __do_page_fault+0x5ef/0xda0 [ 392.624669][T20570] do_page_fault+0x71/0x57d [ 392.634185][T20570] ? page_fault+0x8/0x30 [ 392.634198][T20570] page_fault+0x1e/0x30 [ 392.634208][T20570] RIP: 0033:0x430356 [ 392.634223][T20570] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 392.634230][T20570] RSP: 002b:00007fff9d6a6180 EFLAGS: 00010206 [ 392.634250][T20570] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 392.634258][T20570] RDX: 0000000001550930 RSI: 0000000001558970 RDI: 0000000000000003 [ 392.634265][T20570] RBP: 0000000000008041 R08: 0000000000000001 R09: 000000000154f940 [ 392.634280][T20570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 392.643010][T20570] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 392.660293][T20570] memory: usage 4256kB, limit 0kB, failcnt 32 [ 392.694062][T20570] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 392.718383][T20570] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 392.738474][T20570] Memory cgroup stats for /syz3: cache:32KB rss:100KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:100KB inactive_file:0KB active_file:0KB unevictable:0KB [ 392.759229][T20570] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=20570,uid=0 [ 392.759337][T20570] Memory cgroup out of memory: Killed process 20570 (syz-executor.3) total-vm:72448kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 392.790795][ T1042] oom_reaper: reaped process 20570 (syz-executor.3), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 395.962997][T11304] device bridge_slave_1 left promiscuous mode [ 395.969292][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.041578][T11304] device bridge_slave_0 left promiscuous mode [ 396.047818][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.102400][T11304] device bridge_slave_1 left promiscuous mode [ 396.108683][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.161440][T11304] device bridge_slave_0 left promiscuous mode [ 396.167698][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.222523][T11304] device bridge_slave_1 left promiscuous mode [ 396.228795][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.281419][T11304] device bridge_slave_0 left promiscuous mode [ 396.287650][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.342530][T11304] device bridge_slave_1 left promiscuous mode [ 396.348971][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.401277][T11304] device bridge_slave_0 left promiscuous mode [ 396.407600][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.462267][T11304] device bridge_slave_1 left promiscuous mode [ 396.468503][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.523631][T11304] device bridge_slave_0 left promiscuous mode [ 396.529863][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.602424][T11304] device bridge_slave_1 left promiscuous mode [ 396.608654][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.661340][T11304] device bridge_slave_0 left promiscuous mode [ 396.667580][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.722330][T11304] device bridge_slave_1 left promiscuous mode [ 396.728553][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.791402][T11304] device bridge_slave_0 left promiscuous mode [ 396.797760][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.333741][T11304] device hsr_slave_1 left promiscuous mode [ 422.379722][T11304] device hsr_slave_0 left promiscuous mode [ 422.436324][T11304] team0 (unregistering): Port device team_slave_1 removed [ 422.468056][T11304] team0 (unregistering): Port device team_slave_0 removed [ 422.499418][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 422.562438][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 422.726480][T11304] bond0 (unregistering): Released all slaves [ 422.864077][T11304] device hsr_slave_1 left promiscuous mode [ 422.906505][T11304] device hsr_slave_0 left promiscuous mode [ 422.965968][T11304] team0 (unregistering): Port device team_slave_1 removed [ 422.999441][T11304] team0 (unregistering): Port device team_slave_0 removed [ 423.019923][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 423.089785][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 423.279582][T11304] bond0 (unregistering): Released all slaves [ 423.424964][T11304] device hsr_slave_1 left promiscuous mode [ 423.486157][T11304] device hsr_slave_0 left promiscuous mode [ 423.551747][T11304] team0 (unregistering): Port device team_slave_1 removed [ 423.576212][T11304] team0 (unregistering): Port device team_slave_0 removed [ 423.594292][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 423.662363][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 423.825593][T11304] bond0 (unregistering): Released all slaves [ 424.014137][T11304] device hsr_slave_1 left promiscuous mode [ 424.056473][T11304] device hsr_slave_0 left promiscuous mode [ 424.123224][T11304] device team_slave_1 left promiscuous mode [ 424.141532][T11304] team0 (unregistering): Port device team_slave_1 removed [ 424.167951][T11304] device team_slave_0 left promiscuous mode [ 424.187778][T11304] team0 (unregistering): Port device team_slave_0 removed [ 424.218314][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 424.272342][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 424.469352][T11304] bond0 (unregistering): Released all slaves [ 424.673951][T11304] device hsr_slave_1 left promiscuous mode [ 424.726874][T11304] device hsr_slave_0 left promiscuous mode [ 424.785126][T11304] device team_slave_1 left promiscuous mode [ 424.793207][T11304] team0 (unregistering): Port device team_slave_1 removed [ 424.804308][T11304] device team_slave_0 left promiscuous mode [ 424.818104][T11304] team0 (unregistering): Port device team_slave_0 removed [ 424.836177][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 424.898434][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 424.997823][T11304] bond0 (unregistering): Released all slaves [ 425.183389][T11304] device hsr_slave_1 left promiscuous mode [ 425.244403][T11304] device hsr_slave_0 left promiscuous mode [ 425.323637][T11304] device team_slave_1 left promiscuous mode [ 425.330670][T11304] team0 (unregistering): Port device team_slave_1 removed [ 425.343337][T11304] device team_slave_0 left promiscuous mode [ 425.350040][T11304] team0 (unregistering): Port device team_slave_0 removed [ 425.362987][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 425.407833][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 425.512938][T11304] bond0 (unregistering): Released all slaves [ 425.694596][T11304] device hsr_slave_1 left promiscuous mode [ 425.746047][T11304] device hsr_slave_0 left promiscuous mode [ 425.804994][T11304] device team_slave_1 left promiscuous mode [ 425.813667][T11304] team0 (unregistering): Port device team_slave_1 removed [ 425.826921][T11304] device team_slave_0 left promiscuous mode [ 425.834719][T11304] team0 (unregistering): Port device team_slave_0 removed [ 425.847985][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 425.888356][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 425.988989][T11304] bond0 (unregistering): Released all slaves 18:45:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) 18:45:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) 18:45:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) 18:45:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) 18:45:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) 18:45:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 427.795724][T20621] IPVS: ftp: loaded support on port[0] = 21 [ 427.817297][T20622] IPVS: ftp: loaded support on port[0] = 21 [ 427.847691][T20623] IPVS: ftp: loaded support on port[0] = 21 [ 427.858566][T20624] IPVS: ftp: loaded support on port[0] = 21 [ 427.943434][T20625] IPVS: ftp: loaded support on port[0] = 21 [ 427.967870][T20626] IPVS: ftp: loaded support on port[0] = 21 [ 428.268625][T20621] chnl_net:caif_netlink_parms(): no params data found [ 428.417139][T20622] chnl_net:caif_netlink_parms(): no params data found [ 428.585823][T20625] chnl_net:caif_netlink_parms(): no params data found [ 428.595768][T20624] chnl_net:caif_netlink_parms(): no params data found [ 428.614837][T20621] bridge0: port 1(bridge_slave_0) entered blocking state [ 428.622313][T20621] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.632114][T20621] device bridge_slave_0 entered promiscuous mode [ 428.639809][T20623] chnl_net:caif_netlink_parms(): no params data found [ 428.656653][T20622] bridge0: port 1(bridge_slave_0) entered blocking state [ 428.663935][T20622] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.672541][T20622] device bridge_slave_0 entered promiscuous mode [ 428.684926][T20622] bridge0: port 2(bridge_slave_1) entered blocking state [ 428.692252][T20622] bridge0: port 2(bridge_slave_1) entered disabled state [ 428.700051][T20622] device bridge_slave_1 entered promiscuous mode [ 428.727007][T20621] bridge0: port 2(bridge_slave_1) entered blocking state [ 428.735136][T20621] bridge0: port 2(bridge_slave_1) entered disabled state [ 428.744173][T20621] device bridge_slave_1 entered promiscuous mode [ 428.851796][T20621] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 428.904086][T20622] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 428.914769][T20621] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 428.932481][T20625] bridge0: port 1(bridge_slave_0) entered blocking state [ 428.939753][T20625] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.948657][T20625] device bridge_slave_0 entered promiscuous mode [ 428.990565][T20622] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 429.024721][T20625] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.033314][T20625] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.043197][T20625] device bridge_slave_1 entered promiscuous mode [ 429.050924][T20624] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.057996][T20624] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.066152][T20624] device bridge_slave_0 entered promiscuous mode [ 429.074072][T20623] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.081993][T20623] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.090054][T20623] device bridge_slave_0 entered promiscuous mode [ 429.104408][T20622] team0: Port device team_slave_0 added [ 429.126533][T20622] team0: Port device team_slave_1 added [ 429.133029][T20624] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.140787][T20624] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.148765][T20624] device bridge_slave_1 entered promiscuous mode [ 429.156889][T20623] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.165404][T20623] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.173443][T20623] device bridge_slave_1 entered promiscuous mode [ 429.224084][T20621] team0: Port device team_slave_0 added [ 429.236832][T20621] team0: Port device team_slave_1 added [ 429.272850][T20626] chnl_net:caif_netlink_parms(): no params data found [ 429.295765][T20625] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 429.343974][T20623] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 429.356932][T20625] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 429.413710][T20622] device hsr_slave_0 entered promiscuous mode [ 429.460838][T20622] device hsr_slave_1 entered promiscuous mode [ 429.567476][T20624] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 429.584984][T20623] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 429.644033][T20621] device hsr_slave_0 entered promiscuous mode [ 429.700738][T20621] device hsr_slave_1 entered promiscuous mode [ 429.789986][T20624] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 429.867076][T20623] team0: Port device team_slave_0 added [ 429.879193][T20623] team0: Port device team_slave_1 added [ 429.898553][T20626] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.906064][T20626] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.914730][T20626] device bridge_slave_0 entered promiscuous mode [ 429.933628][T20625] team0: Port device team_slave_0 added [ 429.943593][T20625] team0: Port device team_slave_1 added [ 429.970650][T20626] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.977751][T20626] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.987419][T20626] device bridge_slave_1 entered promiscuous mode [ 429.999501][T20624] team0: Port device team_slave_0 added [ 430.016700][T20624] team0: Port device team_slave_1 added [ 430.173753][T20623] device hsr_slave_0 entered promiscuous mode [ 430.210687][T20623] device hsr_slave_1 entered promiscuous mode [ 430.271524][T20626] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 430.295215][T20622] 8021q: adding VLAN 0 to HW filter on device bond0 [ 430.353626][T20625] device hsr_slave_0 entered promiscuous mode [ 430.410695][T20625] device hsr_slave_1 entered promiscuous mode [ 430.503996][T20624] device hsr_slave_0 entered promiscuous mode [ 430.560893][T20624] device hsr_slave_1 entered promiscuous mode [ 430.621511][T20626] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 430.678875][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 430.688786][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 430.742318][T20626] team0: Port device team_slave_0 added [ 430.761717][T20626] team0: Port device team_slave_1 added [ 430.769648][T20622] 8021q: adding VLAN 0 to HW filter on device team0 [ 430.815564][T20621] 8021q: adding VLAN 0 to HW filter on device bond0 [ 430.859389][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 430.875002][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 430.883782][T13842] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.890868][T13842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 430.898794][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 430.908985][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 430.917561][T13842] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.924684][T13842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 430.933462][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 430.968284][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 430.979097][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 430.987155][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 431.053295][T20626] device hsr_slave_0 entered promiscuous mode [ 431.110985][T20626] device hsr_slave_1 entered promiscuous mode [ 431.175759][T20621] 8021q: adding VLAN 0 to HW filter on device team0 [ 431.193205][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 431.201937][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 431.211964][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 431.220817][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 431.745721][T20625] 8021q: adding VLAN 0 to HW filter on device bond0 [ 431.781453][T20623] 8021q: adding VLAN 0 to HW filter on device bond0 [ 431.801548][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 431.810889][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 431.819207][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 431.826355][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 431.834993][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 431.843987][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 431.859233][T20625] 8021q: adding VLAN 0 to HW filter on device team0 [ 432.140073][T20624] 8021q: adding VLAN 0 to HW filter on device bond0 [ 432.150747][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 432.159308][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 432.167847][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 432.175712][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 432.184975][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 432.193927][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 432.211317][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 432.219802][ T8878] bridge0: port 2(bridge_slave_1) entered blocking state [ 432.227238][ T8878] bridge0: port 2(bridge_slave_1) entered forwarding state [ 432.254630][T20622] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 432.267361][T20622] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 432.537541][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 432.547933][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 432.556988][ T2991] bridge0: port 1(bridge_slave_0) entered blocking state [ 432.564105][ T2991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 432.572617][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 432.582059][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 432.590641][ T2991] bridge0: port 2(bridge_slave_1) entered blocking state [ 432.597739][ T2991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 432.606711][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 432.616281][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 432.625191][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 432.661163][T20623] 8021q: adding VLAN 0 to HW filter on device team0 [ 432.668362][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 432.679632][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 432.688961][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 432.698069][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 432.706088][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 432.989263][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 432.998479][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 433.007281][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 433.017943][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 433.026913][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 433.036227][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.043379][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 433.052081][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 433.060134][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 433.079743][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 433.088755][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 433.097815][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 433.107201][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 433.116572][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 433.139991][T20624] 8021q: adding VLAN 0 to HW filter on device team0 [ 433.159981][T20621] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 433.170910][T20621] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 433.185678][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 433.195230][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 433.204024][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 433.214937][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 433.223390][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 433.231651][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 433.239389][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 433.247974][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 433.256714][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 433.265517][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 433.274054][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 433.563693][T20622] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 433.597264][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 433.609402][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 433.618342][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 433.627346][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 433.636425][ T8878] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.643519][ T8878] bridge0: port 2(bridge_slave_1) entered forwarding state [ 433.651320][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 433.659935][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 433.672715][T20625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 433.982182][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 433.993292][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 434.003666][ T8878] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.010804][ T8878] bridge0: port 1(bridge_slave_0) entered forwarding state [ 434.018605][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 434.027488][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 434.036088][ T8878] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.043213][ T8878] bridge0: port 2(bridge_slave_1) entered forwarding state [ 434.051026][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 434.059682][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 434.068775][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 434.077320][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 434.086032][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 434.094786][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 434.103274][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 434.123138][T20626] 8021q: adding VLAN 0 to HW filter on device bond0 [ 434.130548][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 434.138653][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 434.161675][T20623] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 434.175033][T20623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 434.225893][T20621] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 434.243903][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 434.254077][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 434.267141][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 434.276750][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 434.317047][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 434.326227][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 434.335565][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 434.345726][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 434.478652][T20639] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 434.489591][T20639] CPU: 1 PID: 20639 Comm: syz-executor.2 Not tainted 5.1.0+ #1 [ 434.497145][T20639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.507205][T20639] Call Trace: [ 434.510524][T20639] dump_stack+0x172/0x1f0 [ 434.514891][T20639] dump_header+0x10f/0xb6c [ 434.519329][T20639] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 434.525415][T20639] ? ___ratelimit+0x60/0x595 [ 434.530019][T20639] ? do_raw_spin_unlock+0x57/0x270 [ 434.535150][T20639] oom_kill_process.cold+0x10/0x15 [ 434.540358][T20639] out_of_memory+0x79a/0x1280 [ 434.545051][T20639] ? __sched_text_start+0x8/0x8 [ 434.550088][T20639] ? oom_killer_disable+0x280/0x280 [ 434.555309][T20639] mem_cgroup_out_of_memory+0x1ca/0x230 [ 434.560864][T20639] ? memcg_event_wake+0x230/0x230 [ 434.565901][T20639] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 434.571715][T20639] ? cgroup_file_notify+0x140/0x1b0 [ 434.576928][T20639] memory_max_write+0x169/0x300 [ 434.581851][T20639] ? mem_cgroup_write+0x360/0x360 [ 434.586886][T20639] ? lock_acquire+0x16f/0x3f0 [ 434.591664][T20639] ? kernfs_fop_write+0x227/0x480 [ 434.596736][T20639] cgroup_file_write+0x241/0x790 [ 434.601694][T20639] ? mem_cgroup_write+0x360/0x360 [ 434.606819][T20639] ? init_and_link_css+0x860/0x860 [ 434.611951][T20639] ? init_and_link_css+0x860/0x860 [ 434.617069][T20639] kernfs_fop_write+0x2b8/0x480 [ 434.621936][T20639] __vfs_write+0x8a/0x110 [ 434.626282][T20639] ? kernfs_fop_open+0xd80/0xd80 [ 434.631268][T20639] vfs_write+0x20c/0x580 [ 434.635529][T20639] ksys_write+0x14f/0x290 [ 434.639866][T20639] ? __ia32_sys_read+0xb0/0xb0 [ 434.644749][T20639] ? do_syscall_64+0x26/0x680 [ 434.649443][T20639] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.655538][T20639] ? do_syscall_64+0x26/0x680 [ 434.660223][T20639] __x64_sys_write+0x73/0xb0 [ 434.664836][T20639] do_syscall_64+0xfd/0x680 [ 434.669376][T20639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.675285][T20639] RIP: 0033:0x459279 [ 434.679189][T20639] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 434.698799][T20639] RSP: 002b:00007fc3e7e52c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 434.707319][T20639] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 434.715441][T20639] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 434.723424][T20639] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 434.731400][T20639] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc3e7e536d4 [ 434.739383][T20639] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 434.767472][T20639] memory: usage 7960kB, limit 0kB, failcnt 26 [ 434.773921][T20639] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 434.793635][T20639] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 434.801148][T20639] Memory cgroup stats for /syz2: cache:232KB rss:4188KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4188KB inactive_file:132KB active_file:132KB unevictable:0KB [ 434.824645][T20639] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=20638,uid=0 [ 434.841465][T20639] Memory cgroup out of memory: Killed process 20638 (syz-executor.2) total-vm:72580kB, anon-rss:4228kB, file-rss:35784kB, shmem-rss:0kB [ 434.861293][ T1042] oom_reaper: reaped process 20638 (syz-executor.2), now anon-rss:0kB, file-rss:34912kB, shmem-rss:0kB 18:45:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 434.968380][T20626] 8021q: adding VLAN 0 to HW filter on device team0 [ 434.997303][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 435.005368][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 435.013400][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 435.023204][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 435.027631][T20622] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 435.036803][T20624] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 435.049867][T20622] CPU: 0 PID: 20622 Comm: syz-executor.2 Not tainted 5.1.0+ #1 [ 435.054080][T20624] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 435.059109][T20622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.070990][T20625] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 435.076315][T20622] Call Trace: [ 435.086372][T20622] dump_stack+0x172/0x1f0 [ 435.090732][T20622] dump_header+0x10f/0xb6c [ 435.095163][T20622] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 435.100983][T20622] ? ___ratelimit+0x60/0x595 [ 435.105582][T20622] ? do_raw_spin_unlock+0x57/0x270 [ 435.110741][T20622] oom_kill_process.cold+0x10/0x15 [ 435.115867][T20622] out_of_memory+0x79a/0x1280 [ 435.120559][T20622] ? lock_downgrade+0x880/0x880 [ 435.125422][T20622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.133650][T20622] ? oom_killer_disable+0x280/0x280 [ 435.138857][T20622] ? find_held_lock+0x35/0x130 [ 435.143636][T20622] mem_cgroup_out_of_memory+0x1ca/0x230 [ 435.143651][T20622] ? memcg_event_wake+0x230/0x230 [ 435.143671][T20622] ? do_raw_spin_unlock+0x57/0x270 [ 435.143692][T20622] ? _raw_spin_unlock+0x2d/0x50 [ 435.154273][T20622] try_charge+0x102c/0x15c0 [ 435.168795][T20622] ? find_held_lock+0x35/0x130 [ 435.173846][T20622] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 435.179435][T20622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.185686][T20622] ? kasan_check_read+0x11/0x20 [ 435.190553][T20622] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 435.196141][T20622] mem_cgroup_try_charge+0x24d/0x5e0 [ 435.201445][T20622] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 435.207136][T20622] wp_page_copy+0x416/0x1770 [ 435.211828][T20622] ? do_wp_page+0x5d0/0x16c0 [ 435.216437][T20622] ? pmd_pfn+0x1d0/0x1d0 [ 435.220788][T20622] ? lock_downgrade+0x880/0x880 [ 435.225740][T20622] ? swp_swapcount+0x540/0x540 [ 435.230524][T20622] ? kasan_check_read+0x11/0x20 [ 435.235385][T20622] ? do_raw_spin_unlock+0x57/0x270 [ 435.240547][T20622] do_wp_page+0x5d8/0x16c0 [ 435.244985][T20622] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 435.250383][T20622] __handle_mm_fault+0x22e3/0x3eb0 [ 435.255517][T20622] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 435.261073][T20622] ? find_held_lock+0x35/0x130 [ 435.265940][T20622] ? handle_mm_fault+0x322/0xb30 [ 435.270899][T20622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.277150][T20622] ? kasan_check_read+0x11/0x20 [ 435.282026][T20622] handle_mm_fault+0x43f/0xb30 [ 435.286811][T20622] __do_page_fault+0x5ef/0xda0 [ 435.291684][T20622] do_page_fault+0x71/0x57d [ 435.296214][T20622] ? page_fault+0x8/0x30 [ 435.300486][T20622] page_fault+0x1e/0x30 [ 435.304652][T20622] RIP: 0033:0x430356 [ 435.308554][T20622] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 435.328170][T20622] RSP: 002b:00007ffc80b274c0 EFLAGS: 00010206 [ 435.334261][T20622] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 435.342425][T20622] RDX: 00000000028b9930 RSI: 00000000028c1970 RDI: 0000000000000003 [ 435.350437][T20622] RBP: 0000000000008041 R08: 0000000000000001 R09: 00000000028b8940 [ 435.358419][T20622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 435.366406][T20622] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 435.383192][T20622] memory: usage 3564kB, limit 0kB, failcnt 34 [ 435.389846][T20622] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 435.434740][T20622] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 435.525602][T20622] Memory cgroup stats for /syz2: cache:232KB rss:52KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:52KB inactive_file:132KB active_file:132KB unevictable:0KB [ 435.553974][T20622] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=20622,uid=0 [ 435.579647][T20622] Memory cgroup out of memory: Killed process 20622 (syz-executor.2) total-vm:72448kB, anon-rss:68kB, file-rss:34824kB, shmem-rss:0kB [ 435.605091][ T1042] oom_reaper: reaped process 20622 (syz-executor.2), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 435.605385][T20649] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 435.650409][T20649] CPU: 0 PID: 20649 Comm: syz-executor.5 Not tainted 5.1.0+ #1 [ 435.657988][T20649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.668052][T20649] Call Trace: [ 435.671387][T20649] dump_stack+0x172/0x1f0 [ 435.675733][T20649] dump_header+0x10f/0xb6c [ 435.680185][T20649] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 435.686002][T20649] ? ___ratelimit+0x60/0x595 [ 435.690599][T20649] ? do_raw_spin_unlock+0x57/0x270 [ 435.695747][T20649] oom_kill_process.cold+0x10/0x15 [ 435.700899][T20649] out_of_memory+0x79a/0x1280 [ 435.705600][T20649] ? retint_kernel+0x2b/0x2b [ 435.710204][T20649] ? oom_killer_disable+0x280/0x280 [ 435.715461][T20649] mem_cgroup_out_of_memory+0x1ca/0x230 [ 435.721026][T20649] ? memcg_event_wake+0x230/0x230 [ 435.726074][T20649] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 435.731893][T20649] ? cgroup_file_notify+0x140/0x1b0 [ 435.737112][T20649] memory_max_write+0x169/0x300 [ 435.741976][T20649] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 435.747454][T20649] ? mem_cgroup_write+0x360/0x360 [ 435.752495][T20649] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 435.757965][T20649] cgroup_file_write+0x241/0x790 [ 435.762916][T20649] ? mem_cgroup_write+0x360/0x360 [ 435.767954][T20649] ? init_and_link_css+0x860/0x860 [ 435.773114][T20649] ? init_and_link_css+0x860/0x860 [ 435.778236][T20649] kernfs_fop_write+0x2b8/0x480 [ 435.783127][T20649] __vfs_write+0x8a/0x110 [ 435.787555][T20649] ? kernfs_fop_open+0xd80/0xd80 [ 435.792597][T20649] vfs_write+0x20c/0x580 [ 435.796851][T20649] ksys_write+0x14f/0x290 [ 435.801182][T20649] ? __ia32_sys_read+0xb0/0xb0 [ 435.806038][T20649] __x64_sys_write+0x73/0xb0 [ 435.810632][T20649] do_syscall_64+0xfd/0x680 [ 435.815130][T20649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.821094][T20649] RIP: 0033:0x459279 [ 435.825068][T20649] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 435.845003][T20649] RSP: 002b:00007f429bc93c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 435.853445][T20649] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 435.861443][T20649] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 435.869529][T20649] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 435.877501][T20649] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f429bc946d4 [ 435.885634][T20649] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 435.899327][T20649] memory: usage 7836kB, limit 0kB, failcnt 22 [ 435.906155][T20649] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 435.914092][T20649] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 435.914151][T20649] Memory cgroup stats for /syz5: cache:76KB rss:4232KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4232KB inactive_file:128KB active_file:92KB unevictable:0KB [ 435.944221][T20649] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=20648,uid=0 [ 435.960762][T20649] Memory cgroup out of memory: Killed process 20648 (syz-executor.5) total-vm:72712kB, anon-rss:4240kB, file-rss:35776kB, shmem-rss:0kB [ 435.979036][ T1042] oom_reaper: reaped process 20648 (syz-executor.5), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB [ 436.037546][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 436.046575][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 18:45:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 436.081525][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 436.101396][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 436.111822][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.118953][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 436.129008][T20625] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 436.153212][T20625] CPU: 0 PID: 20625 Comm: syz-executor.5 Not tainted 5.1.0+ #1 [ 436.160805][T20625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.170862][T20625] Call Trace: [ 436.174269][T20625] dump_stack+0x172/0x1f0 [ 436.178616][T20625] dump_header+0x10f/0xb6c [ 436.183044][T20625] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 436.188974][T20625] ? ___ratelimit+0x60/0x595 [ 436.193747][T20625] ? do_raw_spin_unlock+0x57/0x270 [ 436.198868][T20625] oom_kill_process.cold+0x10/0x15 [ 436.203988][T20625] out_of_memory+0x79a/0x1280 [ 436.208824][T20625] ? lock_downgrade+0x880/0x880 [ 436.213703][T20625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.220152][T20625] ? oom_killer_disable+0x280/0x280 [ 436.225653][T20625] ? find_held_lock+0x35/0x130 [ 436.230432][T20625] mem_cgroup_out_of_memory+0x1ca/0x230 [ 436.236076][T20625] ? memcg_event_wake+0x230/0x230 [ 436.241115][T20625] ? do_raw_spin_unlock+0x57/0x270 [ 436.246240][T20625] ? _raw_spin_unlock+0x2d/0x50 [ 436.251172][T20625] try_charge+0x102c/0x15c0 [ 436.256642][T20625] ? find_held_lock+0x35/0x130 [ 436.261426][T20625] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 436.266982][T20625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.273265][T20625] ? kasan_check_read+0x11/0x20 [ 436.278218][T20625] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 436.283792][T20625] mem_cgroup_try_charge+0x24d/0x5e0 [ 436.289095][T20625] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 436.294766][T20625] wp_page_copy+0x416/0x1770 [ 436.299369][T20625] ? do_wp_page+0x5d0/0x16c0 [ 436.303977][T20625] ? pmd_pfn+0x1d0/0x1d0 [ 436.308227][T20625] ? lock_downgrade+0x880/0x880 [ 436.313100][T20625] ? swp_swapcount+0x540/0x540 [ 436.317879][T20625] ? kasan_check_read+0x11/0x20 [ 436.322762][T20625] ? do_raw_spin_unlock+0x57/0x270 [ 436.327893][T20625] do_wp_page+0x5d8/0x16c0 [ 436.332326][T20625] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 436.337704][T20625] __handle_mm_fault+0x22e3/0x3eb0 [ 436.342828][T20625] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 436.349692][T20625] ? find_held_lock+0x35/0x130 [ 436.354457][T20625] ? handle_mm_fault+0x322/0xb30 [ 436.359494][T20625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.365772][T20625] ? kasan_check_read+0x11/0x20 [ 436.370632][T20625] handle_mm_fault+0x43f/0xb30 [ 436.375422][T20625] __do_page_fault+0x5ef/0xda0 [ 436.380220][T20625] do_page_fault+0x71/0x57d [ 436.384756][T20625] ? page_fault+0x8/0x30 [ 436.389008][T20625] page_fault+0x1e/0x30 [ 436.393337][T20625] RIP: 0033:0x403672 [ 436.397264][T20625] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 29 86 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 49 3b 05 00 48 [ 436.416897][T20625] RSP: 002b:00007ffc9544fbe0 EFLAGS: 00010246 [ 436.423053][T20625] RAX: 0000000000000000 RBX: 000000000006a4e6 RCX: 0000000000412e80 [ 436.431029][T20625] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffc95450d10 [ 436.439093][T20625] RBP: 0000000000000002 R08: 0000000000000001 R09: 000000000261c940 [ 436.447062][T20625] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc95450d10 [ 436.455057][T20625] R13: 00007ffc95450d00 R14: 0000000000000000 R15: 00007ffc95450d10 [ 436.466553][T20625] memory: usage 3420kB, limit 0kB, failcnt 34 [ 436.472738][T20625] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 436.480933][T20625] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 436.487799][T20625] Memory cgroup stats for /syz5: cache:76KB rss:44KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:44KB inactive_file:128KB active_file:92KB unevictable:0KB [ 436.509143][T20625] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=20625,uid=0 [ 436.524757][T20625] Memory cgroup out of memory: Killed process 20625 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 436.539236][ T1042] oom_reaper: reaped process 20625 (syz-executor.5), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 436.628135][T20654] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 436.638755][T20654] CPU: 0 PID: 20654 Comm: syz-executor.3 Not tainted 5.1.0+ #1 [ 436.646418][T20654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.656646][T20654] Call Trace: [ 436.659926][T20654] dump_stack+0x172/0x1f0 [ 436.664287][T20654] dump_header+0x10f/0xb6c [ 436.668721][T20654] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 436.674668][T20654] ? ___ratelimit+0x60/0x595 [ 436.679292][T20654] ? do_raw_spin_unlock+0x57/0x270 [ 436.684396][T20654] oom_kill_process.cold+0x10/0x15 [ 436.689578][T20654] out_of_memory+0x79a/0x1280 [ 436.694238][T20654] ? __sched_text_start+0x8/0x8 [ 436.699083][T20654] ? oom_killer_disable+0x280/0x280 [ 436.704283][T20654] mem_cgroup_out_of_memory+0x1ca/0x230 [ 436.709828][T20654] ? memcg_event_wake+0x230/0x230 [ 436.714859][T20654] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 436.720650][T20654] ? cgroup_file_notify+0x140/0x1b0 [ 436.726190][T20654] memory_max_write+0x169/0x300 [ 436.731031][T20654] ? mem_cgroup_write+0x360/0x360 [ 436.736064][T20654] ? lock_acquire+0x1ea/0x3f0 [ 436.740753][T20654] cgroup_file_write+0x241/0x790 [ 436.745689][T20654] ? mem_cgroup_write+0x360/0x360 [ 436.750698][T20654] ? init_and_link_css+0x860/0x860 [ 436.755815][T20654] ? init_and_link_css+0x860/0x860 [ 436.760961][T20654] kernfs_fop_write+0x2b8/0x480 [ 436.765821][T20654] __vfs_write+0x8a/0x110 [ 436.770161][T20654] ? kernfs_fop_open+0xd80/0xd80 [ 436.775111][T20654] vfs_write+0x20c/0x580 [ 436.779342][T20654] ksys_write+0x14f/0x290 [ 436.783663][T20654] ? __ia32_sys_read+0xb0/0xb0 [ 436.788541][T20654] ? do_syscall_64+0x26/0x680 [ 436.793239][T20654] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.799925][T20654] ? do_syscall_64+0x26/0x680 [ 436.804725][T20654] __x64_sys_write+0x73/0xb0 [ 436.809857][T20654] do_syscall_64+0xfd/0x680 [ 436.815084][T20654] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.820969][T20654] RIP: 0033:0x459279 [ 436.824966][T20654] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 436.844925][T20654] RSP: 002b:00007fd1d9656c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 436.860180][T20654] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 436.868280][T20654] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 436.876365][T20654] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 436.884547][T20654] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd1d96576d4 [ 436.892534][T20654] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 436.906441][T20654] memory: usage 8076kB, limit 0kB, failcnt 33 [ 436.928540][T20654] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 436.937100][T20654] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 436.947202][T20623] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 436.957846][T20654] Memory cgroup stats for /syz3: cache:32KB rss:4172KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4172KB inactive_file:0KB active_file:0KB unevictable:0KB [ 436.989484][T20589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 436.998222][T20589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 437.007595][T20589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 437.016573][T20589] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.023702][T20589] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.032851][T20589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 437.060032][T20654] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=20653,uid=0 18:45:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 437.099556][T20654] Memory cgroup out of memory: Killed process 20653 (syz-executor.3) total-vm:72844kB, anon-rss:4244kB, file-rss:35772kB, shmem-rss:0kB [ 437.122649][ T1042] oom_reaper: reaped process 20653 (syz-executor.3), now anon-rss:0kB, file-rss:34812kB, shmem-rss:0kB [ 437.180008][T20621] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 437.200472][T20621] CPU: 0 PID: 20621 Comm: syz-executor.3 Not tainted 5.1.0+ #1 [ 437.208223][T20621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.218684][T20621] Call Trace: [ 437.222158][T20621] dump_stack+0x172/0x1f0 [ 437.226495][T20621] dump_header+0x10f/0xb6c [ 437.230916][T20621] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 437.236733][T20621] ? ___ratelimit+0x60/0x595 [ 437.241331][T20621] ? do_raw_spin_unlock+0x57/0x270 [ 437.246455][T20621] oom_kill_process.cold+0x10/0x15 [ 437.251580][T20621] out_of_memory+0x79a/0x1280 [ 437.256276][T20621] ? lock_downgrade+0x880/0x880 [ 437.261131][T20621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.267383][T20621] ? oom_killer_disable+0x280/0x280 [ 437.272690][T20621] ? find_held_lock+0x35/0x130 [ 437.277469][T20621] mem_cgroup_out_of_memory+0x1ca/0x230 [ 437.283016][T20621] ? memcg_event_wake+0x230/0x230 [ 437.288049][T20621] ? do_raw_spin_unlock+0x57/0x270 [ 437.293194][T20621] ? _raw_spin_unlock+0x2d/0x50 [ 437.298048][T20621] try_charge+0x102c/0x15c0 [ 437.302555][T20621] ? find_held_lock+0x35/0x130 [ 437.307419][T20621] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 437.312982][T20621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.319341][T20621] ? kasan_check_read+0x11/0x20 [ 437.324210][T20621] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 437.329865][T20621] mem_cgroup_try_charge+0x24d/0x5e0 [ 437.335264][T20621] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 437.340908][T20621] __handle_mm_fault+0x1e1a/0x3eb0 [ 437.346031][T20621] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 437.351607][T20621] ? find_held_lock+0x35/0x130 [ 437.356376][T20621] ? handle_mm_fault+0x322/0xb30 [ 437.361329][T20621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.367581][T20621] ? kasan_check_read+0x11/0x20 [ 437.372440][T20621] handle_mm_fault+0x43f/0xb30 [ 437.377235][T20621] __do_page_fault+0x5ef/0xda0 [ 437.382029][T20621] do_page_fault+0x71/0x57d [ 437.386533][T20621] ? page_fault+0x8/0x30 [ 437.390783][T20621] page_fault+0x1e/0x30 [ 437.394941][T20621] RIP: 0033:0x403672 [ 437.398830][T20621] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 29 86 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 49 3b 05 00 48 [ 437.418717][T20621] RSP: 002b:00007fff36552e10 EFLAGS: 00010246 [ 437.424799][T20621] RAX: 0000000000000000 RBX: 000000000006ab3f RCX: 0000000000412e80 [ 437.432803][T20621] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007fff36553f40 [ 437.440782][T20621] RBP: 0000000000000002 R08: 0000000000000001 R09: 000000000296e940 [ 437.448745][T20621] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff36553f40 [ 437.456749][T20621] R13: 00007fff36553f30 R14: 0000000000000000 R15: 00007fff36553f40 [ 437.467757][T20621] memory: usage 3624kB, limit 0kB, failcnt 45 [ 437.474727][T20621] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 437.482289][T20621] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 437.482297][T20621] Memory cgroup stats for /syz3: cache:32KB rss:64KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:64KB inactive_file:0KB active_file:0KB unevictable:0KB [ 437.510287][T20621] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=20621,uid=0 [ 437.525760][T20621] Memory cgroup out of memory: Killed process 20621 (syz-executor.3) total-vm:72448kB, anon-rss:68kB, file-rss:34824kB, shmem-rss:0kB [ 437.540309][ T1042] oom_reaper: reaped process 20621 (syz-executor.3), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 437.709669][T20624] 8021q: adding VLAN 0 to HW filter on device batadv0 18:45:31 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x11x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') [ 437.758270][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 437.781411][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 437.800059][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 18:45:31 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x11x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') [ 437.820335][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 437.829185][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 437.838729][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 437.848079][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 18:45:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 438.055842][T20626] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 438.072485][T20626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 438.099439][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 438.111309][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 438.133849][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 438.260845][T20626] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 438.443198][T20666] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 438.473075][T20666] CPU: 0 PID: 20666 Comm: syz-executor.1 Not tainted 5.1.0+ #1 [ 438.480662][T20666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.490936][T20666] Call Trace: [ 438.494275][T20666] dump_stack+0x172/0x1f0 [ 438.498719][T20666] dump_header+0x10f/0xb6c [ 438.503165][T20666] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 438.508994][T20666] ? ___ratelimit+0x60/0x595 [ 438.513604][T20666] ? do_raw_spin_unlock+0x57/0x270 [ 438.518764][T20666] oom_kill_process.cold+0x10/0x15 [ 438.523934][T20666] out_of_memory+0x79a/0x1280 [ 438.528643][T20666] ? __sched_text_start+0x8/0x8 [ 438.533524][T20666] ? oom_killer_disable+0x280/0x280 [ 438.538766][T20666] mem_cgroup_out_of_memory+0x1ca/0x230 [ 438.544338][T20666] ? memcg_event_wake+0x230/0x230 [ 438.549396][T20666] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 438.555222][T20666] ? cgroup_file_notify+0x140/0x1b0 [ 438.560456][T20666] memory_max_write+0x169/0x300 [ 438.565329][T20666] ? mem_cgroup_write+0x360/0x360 [ 438.570486][T20666] ? lock_acquire+0x1ea/0x3f0 [ 438.575191][T20666] cgroup_file_write+0x241/0x790 [ 438.580185][T20666] ? mem_cgroup_write+0x360/0x360 [ 438.585243][T20666] ? init_and_link_css+0x860/0x860 [ 438.590404][T20666] ? init_and_link_css+0x860/0x860 [ 438.595567][T20666] kernfs_fop_write+0x2b8/0x480 [ 438.600447][T20666] __vfs_write+0x8a/0x110 [ 438.604825][T20666] ? kernfs_fop_open+0xd80/0xd80 [ 438.609908][T20666] vfs_write+0x20c/0x580 [ 438.614169][T20666] ksys_write+0x14f/0x290 [ 438.618513][T20666] ? __ia32_sys_read+0xb0/0xb0 [ 438.623382][T20666] ? do_syscall_64+0x26/0x680 [ 438.628073][T20666] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.634155][T20666] ? do_syscall_64+0x26/0x680 [ 438.638854][T20666] __x64_sys_write+0x73/0xb0 [ 438.643475][T20666] do_syscall_64+0xfd/0x680 [ 438.647992][T20666] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.654051][T20666] RIP: 0033:0x459279 [ 438.657957][T20666] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 438.677571][T20666] RSP: 002b:00007f2317fe2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 438.685984][T20666] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 438.694044][T20666] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 438.702012][T20666] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 438.710094][T20666] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2317fe36d4 [ 438.718084][T20666] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 438.747126][T20666] memory: usage 6884kB, limit 0kB, failcnt 26 [ 438.766367][T20666] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 438.790796][T20666] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 438.798049][T20666] Memory cgroup stats for /syz1: cache:28KB rss:4168KB rss_huge:4096KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4168KB inactive_file:148KB active_file:64KB unevictable:0KB [ 438.825710][T20666] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=20665,uid=0 [ 438.843238][T20666] Memory cgroup out of memory: Killed process 20665 (syz-executor.1) total-vm:72712kB, anon-rss:4236kB, file-rss:35776kB, shmem-rss:0kB [ 438.863696][ T1042] oom_reaper: reaped process 20665 (syz-executor.1), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 438.876601][T20672] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 438.913110][T20672] CPU: 1 PID: 20672 Comm: syz-executor.0 Not tainted 5.1.0+ #1 [ 438.920702][T20672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.930882][T20672] Call Trace: [ 438.930913][T20672] dump_stack+0x172/0x1f0 [ 438.930936][T20672] dump_header+0x10f/0xb6c [ 438.930959][T20672] ? oom_kill_process+0x94/0x3f0 [ 438.947953][T20672] oom_kill_process.cold+0x10/0x15 [ 438.953113][T20672] out_of_memory+0x79a/0x1280 [ 438.957834][T20672] ? oom_killer_disable+0x280/0x280 [ 438.963053][T20672] ? trace_hardirqs_on_caller+0x6a/0x220 [ 438.969121][T20672] mem_cgroup_out_of_memory+0x1ca/0x230 [ 438.980820][T20672] ? memcg_event_wake+0x230/0x230 [ 438.985860][T20672] ? retint_kernel+0x2b/0x2b [ 438.990480][T20672] memory_max_write+0x169/0x300 [ 438.995342][T20672] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 439.000842][T20672] ? mem_cgroup_write+0x360/0x360 [ 439.000861][T20672] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 439.000880][T20672] cgroup_file_write+0x241/0x790 [ 439.000896][T20672] ? mem_cgroup_write+0x360/0x360 [ 439.000910][T20672] ? init_and_link_css+0x860/0x860 [ 439.000930][T20672] ? kernfs_ops+0x9f/0x120 [ 439.030970][T20672] ? init_and_link_css+0x860/0x860 [ 439.030991][T20672] kernfs_fop_write+0x2b8/0x480 [ 439.041058][T20672] __vfs_write+0x8a/0x110 [ 439.041072][T20672] ? kernfs_fop_open+0xd80/0xd80 [ 439.041086][T20672] vfs_write+0x20c/0x580 [ 439.041102][T20672] ksys_write+0x14f/0x290 [ 439.041117][T20672] ? __ia32_sys_read+0xb0/0xb0 [ 439.041141][T20672] ? do_syscall_64+0x26/0x680 [ 439.068395][T20672] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.074566][T20672] ? do_syscall_64+0x26/0x680 [ 439.079270][T20672] __x64_sys_write+0x73/0xb0 [ 439.083886][T20672] do_syscall_64+0xfd/0x680 [ 439.088409][T20672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.094310][T20672] RIP: 0033:0x459279 [ 439.098220][T20672] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 439.117962][T20672] RSP: 002b:00007f5007ddbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 439.117978][T20672] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 439.117985][T20672] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 439.117992][T20672] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 439.117999][T20672] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5007ddc6d4 [ 439.118006][T20672] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 439.390895][T20672] memory: usage 8120kB, limit 0kB, failcnt 123069 [ 439.397796][T20672] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 439.446426][T20672] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 439.466345][T20672] Memory cgroup stats for /syz0: cache:100KB rss:4208KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4208KB inactive_file:0KB active_file:0KB unevictable:0KB [ 439.509883][T20672] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=20671,uid=0 [ 439.539527][T20683] IPVS: ftp: loaded support on port[0] = 21 [ 439.555475][T20672] Memory cgroup out of memory: Killed process 20672 (syz-executor.0) total-vm:72712kB, anon-rss:4244kB, file-rss:35820kB, shmem-rss:0kB [ 439.574594][ T1042] oom_reaper: reaped process 20672 (syz-executor.0), now anon-rss:0kB, file-rss:34924kB, shmem-rss:0kB [ 439.574790][T20680] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 18:45:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) 18:45:33 executing program 5: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0xc6) gettid() bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) close(r0) socketpair(0x0, 0x80000, 0x10000, 0x0) 18:45:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 439.615888][T20680] CPU: 1 PID: 20680 Comm: syz-executor.4 Not tainted 5.1.0+ #1 [ 439.623467][T20680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.633546][T20680] Call Trace: [ 439.636866][T20680] dump_stack+0x172/0x1f0 [ 439.641217][T20680] dump_header+0x10f/0xb6c [ 439.645676][T20680] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 439.651508][T20680] ? ___ratelimit+0x60/0x595 [ 439.656129][T20680] ? do_raw_spin_unlock+0x57/0x270 [ 439.661277][T20680] oom_kill_process.cold+0x10/0x15 [ 439.666414][T20680] out_of_memory+0x79a/0x1280 [ 439.671115][T20680] ? oom_killer_disable+0x280/0x280 [ 439.676678][T20680] ? cgroup_file_notify+0x140/0x1b0 [ 439.683478][T20680] mem_cgroup_out_of_memory+0x1ca/0x230 [ 439.689044][T20680] ? memcg_event_wake+0x230/0x230 [ 439.694091][T20680] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 439.699907][T20680] ? cgroup_file_notify+0x140/0x1b0 [ 439.705123][T20680] memory_max_write+0x169/0x300 [ 439.710020][T20680] ? mem_cgroup_write+0x360/0x360 [ 439.715050][T20680] ? lock_acquire+0x16f/0x3f0 [ 439.719731][T20680] ? kernfs_fop_write+0x227/0x480 [ 439.724780][T20680] cgroup_file_write+0x241/0x790 [ 439.729732][T20680] ? mem_cgroup_write+0x360/0x360 [ 439.734775][T20680] ? init_and_link_css+0x860/0x860 [ 439.740035][T20680] ? init_and_link_css+0x860/0x860 [ 439.745149][T20680] kernfs_fop_write+0x2b8/0x480 [ 439.750000][T20680] __vfs_write+0x8a/0x110 [ 439.754332][T20680] ? kernfs_fop_open+0xd80/0xd80 [ 439.759428][T20680] vfs_write+0x20c/0x580 [ 439.763658][T20680] ksys_write+0x14f/0x290 [ 439.768120][T20680] ? __ia32_sys_read+0xb0/0xb0 [ 439.772877][T20680] ? do_syscall_64+0x26/0x680 [ 439.777566][T20680] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.783634][T20680] ? do_syscall_64+0x26/0x680 [ 439.788305][T20680] __x64_sys_write+0x73/0xb0 [ 439.792884][T20680] do_syscall_64+0xfd/0x680 [ 439.797379][T20680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.803342][T20680] RIP: 0033:0x459279 [ 439.807310][T20680] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 439.826905][T20680] RSP: 002b:00007f5e9bbf5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 439.835306][T20680] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 439.843286][T20680] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 439.851282][T20680] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 439.859258][T20680] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5e9bbf66d4 18:45:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001, 0x4}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xe703000000000000]}, 0x2c) [ 439.867228][T20680] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 439.878821][T20680] memory: usage 7044kB, limit 0kB, failcnt 20 [ 439.901212][T20680] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 439.908821][T20680] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 439.915955][T20680] Memory cgroup stats for /syz4: cache:48KB rss:4172KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4228KB inactive_file:112KB active_file:0KB unevictable:0KB [ 439.937674][T20680] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=20678,uid=0 [ 439.953586][T20680] Memory cgroup out of memory: Killed process 20678 (syz-executor.4) total-vm:72844kB, anon-rss:4248kB, file-rss:35768kB, shmem-rss:0kB [ 439.969996][ T1042] oom_reaper: reaped process 20678 (syz-executor.4), now anon-rss:0kB, file-rss:34872kB, shmem-rss:0kB [ 439.977225][T20623] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 440.011343][T20623] CPU: 0 PID: 20623 Comm: syz-executor.1 Not tainted 5.1.0+ #1 [ 440.018935][T20623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.029095][T20623] Call Trace: [ 440.032390][T20623] dump_stack+0x172/0x1f0 [ 440.032409][T20623] dump_header+0x10f/0xb6c [ 440.032426][T20623] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 440.032439][T20623] ? ___ratelimit+0x60/0x595 [ 440.032452][T20623] ? do_raw_spin_unlock+0x57/0x270 18:45:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) [ 440.032469][T20623] oom_kill_process.cold+0x10/0x15 [ 440.032489][T20623] out_of_memory+0x79a/0x1280 [ 440.032506][T20623] ? oom_killer_disable+0x280/0x280 [ 440.032515][T20623] ? find_held_lock+0x35/0x130 [ 440.032534][T20623] mem_cgroup_out_of_memory+0x1ca/0x230 [ 440.032544][T20623] ? memcg_event_wake+0x230/0x230 [ 440.032560][T20623] ? do_raw_spin_unlock+0x57/0x270 [ 440.041442][T20623] ? _raw_spin_unlock+0x2d/0x50 [ 440.041460][T20623] try_charge+0x102c/0x15c0 [ 440.041472][T20623] ? find_held_lock+0x35/0x130 [ 440.041494][T20623] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 440.041514][T20623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.051922][T20623] ? kasan_check_read+0x11/0x20 [ 440.051941][T20623] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 440.051959][T20623] mem_cgroup_try_charge+0x24d/0x5e0 [ 440.051978][T20623] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 440.051997][T20623] wp_page_copy+0x416/0x1770 [ 440.052016][T20623] ? do_wp_page+0x5d0/0x16c0 [ 440.062227][T20623] ? pmd_pfn+0x1d0/0x1d0 [ 440.062254][T20623] ? lock_downgrade+0x880/0x880 [ 440.062274][T20623] ? swp_swapcount+0x540/0x540 [ 440.062288][T20623] ? kasan_check_read+0x11/0x20 [ 440.062303][T20623] ? do_raw_spin_unlock+0x57/0x270 [ 440.062321][T20623] do_wp_page+0x5d8/0x16c0 [ 440.062339][T20623] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 440.062360][T20623] __handle_mm_fault+0x22e3/0x3eb0 [ 440.062377][T20623] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 440.062389][T20623] ? find_held_lock+0x35/0x130 [ 440.062401][T20623] ? handle_mm_fault+0x322/0xb30 [ 440.062422][T20623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.062436][T20623] ? kasan_check_read+0x11/0x20 [ 440.062452][T20623] handle_mm_fault+0x43f/0xb30 [ 440.062471][T20623] __do_page_fault+0x5ef/0xda0 [ 440.062495][T20623] do_page_fault+0x71/0x57d [ 440.072354][T20623] ? page_fault+0x8/0x30 [ 440.072367][T20623] page_fault+0x1e/0x30 [ 440.072377][T20623] RIP: 0033:0x430356 [ 440.072392][T20623] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 440.072399][T20623] RSP: 002b:00007fff98d0e650 EFLAGS: 00010206 [ 440.082800][T20623] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 440.082808][T20623] RDX: 0000000002721930 RSI: 0000000002729970 RDI: 0000000000000003 [ 440.082815][T20623] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002720940 [ 440.082822][T20623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 440.082829][T20623] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 440.094913][T20623] memory: usage 2460kB, limit 0kB, failcnt 34 [ 440.110666][T20623] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 440.119802][T20623] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 440.149194][T20623] Memory cgroup stats for /syz1: cache:28KB rss:0KB rss_huge:0KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:148KB active_file:64KB unevictable:0KB [ 440.158525][T20623] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=20623,uid=0 [ 440.190288][T20623] Memory cgroup out of memory: Killed process 20623 (syz-executor.1) total-vm:72448kB, anon-rss:68kB, file-rss:34824kB, shmem-rss:0kB [ 440.240331][T20624] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 440.265314][T20624] CPU: 0 PID: 20624 Comm: syz-executor.0 Not tainted 5.1.0+ #1 [ 440.303006][T20624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.303013][T20624] Call Trace: [ 440.303039][T20624] dump_stack+0x172/0x1f0 [ 440.303056][T20624] dump_header+0x10f/0xb6c [ 440.303073][T20624] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 440.303085][T20624] ? ___ratelimit+0x60/0x595 [ 440.303098][T20624] ? do_raw_spin_unlock+0x57/0x270 [ 440.303113][T20624] oom_kill_process.cold+0x10/0x15 [ 440.303126][T20624] out_of_memory+0x79a/0x1280 [ 440.303147][T20624] ? oom_killer_disable+0x280/0x280 [ 440.303158][T20624] ? find_held_lock+0x35/0x130 [ 440.303181][T20624] mem_cgroup_out_of_memory+0x1ca/0x230 [ 440.303194][T20624] ? memcg_event_wake+0x230/0x230 [ 440.303213][T20624] ? do_raw_spin_unlock+0x57/0x270 [ 440.303226][T20624] ? _raw_spin_unlock+0x2d/0x50 [ 440.303242][T20624] try_charge+0x102c/0x15c0 [ 440.303270][T20624] ? find_held_lock+0x35/0x130 [ 440.303290][T20624] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 440.303307][T20624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.303323][T20624] ? kasan_check_read+0x11/0x20 [ 440.303340][T20624] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 440.303357][T20624] mem_cgroup_try_charge+0x24d/0x5e0 [ 440.303377][T20624] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 440.303395][T20624] wp_page_copy+0x416/0x1770 [ 440.303410][T20624] ? do_wp_page+0x5d0/0x16c0 [ 440.303431][T20624] ? pmd_pfn+0x1d0/0x1d0 [ 440.303449][T20624] ? lock_downgrade+0x880/0x880 [ 440.303464][T20624] ? swp_swapcount+0x540/0x540 [ 440.303477][T20624] ? kasan_check_read+0x11/0x20 [ 440.303491][T20624] ? do_raw_spin_unlock+0x57/0x270 [ 440.303508][T20624] do_wp_page+0x5d8/0x16c0 [ 440.303528][T20624] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 440.303548][T20624] __handle_mm_fault+0x22e3/0x3eb0 [ 440.303566][T20624] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 440.303577][T20624] ? find_held_lock+0x35/0x130 [ 440.303591][T20624] ? handle_mm_fault+0x322/0xb30 [ 440.303612][T20624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.303626][T20624] ? kasan_check_read+0x11/0x20 [ 440.303642][T20624] handle_mm_fault+0x43f/0xb30 [ 440.303660][T20624] __do_page_fault+0x5ef/0xda0 [ 440.303680][T20624] do_page_fault+0x71/0x57d [ 440.303692][T20624] ? page_fault+0x8/0x30 [ 440.303705][T20624] page_fault+0x1e/0x30 [ 440.303716][T20624] RIP: 0033:0x403672 [ 440.303732][T20624] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 29 86 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 49 3b 05 00 48 [ 440.303739][T20624] RSP: 002b:00007fff2e257d40 EFLAGS: 00010246 [ 440.303749][T20624] RAX: 0000000000000000 RBX: 000000000006b3c6 RCX: 0000000000412e80 [ 440.303775][T20624] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007fff2e258e70 [ 440.327715][T20624] RBP: 0000000000000002 R08: 0000000000000001 R09: 000000000133c940 [ 440.327733][T20624] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff2e258e70 [ 440.349346][T20624] R13: 00007fff2e258e60 R14: 0000000000000000 R15: 00007fff2e258e70 [ 440.491939][T20624] memory: usage 3760kB, limit 0kB, failcnt 123077 [ 440.498385][T20624] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 440.540292][T20624] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 440.560278][T20624] Memory cgroup stats for /syz0: cache:100KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:56KB inactive_file:0KB active_file:0KB unevictable:0KB [ 440.583610][T20624] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=20624,uid=0 [ 440.583689][T20624] Memory cgroup out of memory: Killed process 20624 (syz-executor.0) total-vm:72448kB, anon-rss:76kB, file-rss:34824kB, shmem-rss:0kB [ 440.610922][ T1042] oom_reaper: reaped process 20624 (syz-executor.0), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 440.690402][T20626] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 440.817671][T20626] CPU: 0 PID: 20626 Comm: syz-executor.4 Not tainted 5.1.0+ #1 [ 440.825238][T20626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.835311][T20626] Call Trace: [ 440.838650][T20626] dump_stack+0x172/0x1f0 [ 440.843000][T20626] dump_header+0x10f/0xb6c [ 440.847435][T20626] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 440.856221][T20626] ? ___ratelimit+0x60/0x595 [ 440.861723][T20626] ? do_raw_spin_unlock+0x57/0x270 [ 440.868597][T20626] oom_kill_process.cold+0x10/0x15 [ 440.874206][T20626] out_of_memory+0x79a/0x1280 [ 440.882049][T20626] ? oom_killer_disable+0x280/0x280 [ 440.893031][T20626] ? find_held_lock+0x35/0x130 [ 440.900526][T20626] mem_cgroup_out_of_memory+0x1ca/0x230 [ 440.908568][T20626] ? memcg_event_wake+0x230/0x230 [ 440.915092][T20626] ? do_raw_spin_unlock+0x57/0x270 [ 440.922856][T20626] ? _raw_spin_unlock+0x2d/0x50 [ 440.929758][T20626] try_charge+0x102c/0x15c0 [ 440.939314][T20626] ? find_held_lock+0x35/0x130 [ 440.945010][T20626] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 440.950762][T20626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.958230][T20626] ? kasan_check_read+0x11/0x20 [ 440.963117][T20626] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 440.968703][T20626] mem_cgroup_try_charge+0x24d/0x5e0 [ 440.979584][T20626] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 440.985231][T20626] wp_page_copy+0x416/0x1770 [ 440.989834][T20626] ? do_wp_page+0x5d0/0x16c0 [ 440.994439][T20626] ? pmd_pfn+0x1d0/0x1d0 [ 440.999146][T20626] ? lock_downgrade+0x880/0x880 [ 441.003995][T20626] ? swp_swapcount+0x540/0x540 [ 441.008757][T20626] ? kasan_check_read+0x11/0x20 [ 441.013609][T20626] ? do_raw_spin_unlock+0x57/0x270 [ 441.018725][T20626] do_wp_page+0x5d8/0x16c0 [ 441.023148][T20626] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 441.028524][T20626] __handle_mm_fault+0x22e3/0x3eb0 [ 441.033638][T20626] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 441.039183][T20626] ? find_held_lock+0x35/0x130 [ 441.043950][T20626] ? handle_mm_fault+0x322/0xb30 [ 441.048893][T20626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.055131][T20626] ? kasan_check_read+0x11/0x20 [ 441.059989][T20626] handle_mm_fault+0x43f/0xb30 [ 441.064760][T20626] __do_page_fault+0x5ef/0xda0 [ 441.069531][T20626] do_page_fault+0x71/0x57d [ 441.074039][T20626] ? page_fault+0x8/0x30 [ 441.078293][T20626] page_fault+0x1e/0x30 [ 441.082450][T20626] RIP: 0033:0x403672 [ 441.086355][T20626] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 29 86 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 49 3b 05 00 48 [ 441.105963][T20626] RSP: 002b:00007ffed3d8ecb0 EFLAGS: 00010246 [ 441.112033][T20626] RAX: 0000000000000000 RBX: 000000000006b54d RCX: 0000000000412e80 [ 441.120012][T20626] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffed3d8fde0 [ 441.130179][T20626] RBP: 0000000000000002 R08: 0000000000000001 R09: 00000000026f3940 [ 441.138153][T20626] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffed3d8fde0 [ 441.146149][T20626] R13: 00007ffed3d8fdd0 R14: 0000000000000000 R15: 00007ffed3d8fde0 [ 441.167793][T20626] memory: usage 2580kB, limit 0kB, failcnt 28 [ 441.173959][T20626] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 441.188372][T20626] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 441.197953][T20626] Memory cgroup stats for /syz4: cache:48KB rss:64KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:64KB inactive_file:112KB active_file:0KB unevictable:0KB [ 441.220264][T20626] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=20626,uid=0 [ 441.235809][T20626] Memory cgroup out of memory: Killed process 20626 (syz-executor.4) total-vm:72448kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 441.250603][ T1042] oom_reaper: reaped process 20626 (syz-executor.4), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 441.417165][T20686] IPVS: ftp: loaded support on port[0] = 21 18:45:35 executing program 0: ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x800454cf, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000ea00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x2) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x20a80, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) 18:45:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x2}, 0xc) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 441.772129][T20687] IPVS: ftp: loaded support on port[0] = 21 18:45:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='cser\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/E\xdbh\x03\xfb\xa1\x90\xd60[\xdc\xcaQ,\xc3\xd0\xd4\xa0\xf8\x18\x18$^\x1f\x9c\xfd\xa4\x94 n\ve\xe3\xa3\xa0\x96\x93\x05\x9b\x81\xa5b\x01\xc2\xbbD\x93\xce2c\xb5>\x1f\x7f\x12z5\x87\xed|P>9hU\x1f\xacxtg\xc9Q\xd41\xb6\xfeb\xc7=\xff\xc2U]\xf1J\xbb\xe3_\x8f\x9a<\xe8\xdd\xb02,\xc6\xf7\xe5%\x96\r\xf27\xf0\x03A\xfa\x0e\xe8\xd0\x96B\xaaZl', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r6 = socket$kcm(0x11, 0x2, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r9 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x40) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) openat$cgroup_ro(r4, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) r10 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) openat$cgroup_ro(r8, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000003c0)=0x100, 0x12) 18:45:35 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:45:35 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0xceb2, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) [ 442.107579][T20683] chnl_net:caif_netlink_parms(): no params data found [ 442.250805][T20683] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.257980][T20683] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.266392][T20683] device bridge_slave_0 entered promiscuous mode [ 442.277776][T20683] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.285233][T20683] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.293617][T20683] device bridge_slave_1 entered promiscuous mode [ 442.426800][T20683] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 442.442102][T20683] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 442.525544][T20687] chnl_net:caif_netlink_parms(): no params data found [ 442.552272][T20686] chnl_net:caif_netlink_parms(): no params data found [ 442.574934][T20683] team0: Port device team_slave_0 added [ 442.582953][T20683] team0: Port device team_slave_1 added [ 442.692980][T20687] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.700069][T20687] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.708733][T20687] device bridge_slave_0 entered promiscuous mode [ 442.797938][T20687] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.807089][T20687] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.815185][T20687] device bridge_slave_1 entered promiscuous mode [ 442.823823][T20686] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.831168][T20686] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.839329][T20686] device bridge_slave_0 entered promiscuous mode [ 442.903483][T20683] device hsr_slave_0 entered promiscuous mode [ 442.950784][T20683] device hsr_slave_1 entered promiscuous mode [ 442.998156][T20686] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.005944][T20686] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.014838][T20686] device bridge_slave_1 entered promiscuous mode [ 443.092876][T20687] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 443.177582][T20687] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 443.194350][T20686] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 443.220780][T20686] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 443.234743][T20693] IPVS: ftp: loaded support on port[0] = 21 [ 443.287805][T20687] team0: Port device team_slave_0 added [ 443.313270][T20694] IPVS: ftp: loaded support on port[0] = 21 [ 443.343350][T20687] team0: Port device team_slave_1 added [ 443.393525][T20686] team0: Port device team_slave_0 added [ 443.422744][T20686] team0: Port device team_slave_1 added [ 443.554054][T20687] device hsr_slave_0 entered promiscuous mode [ 443.600895][T20687] device hsr_slave_1 entered promiscuous mode [ 443.644015][T11304] device bridge_slave_1 left promiscuous mode [ 443.650863][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.701423][T11304] device bridge_slave_0 left promiscuous mode [ 443.707749][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.752468][T11304] device bridge_slave_1 left promiscuous mode [ 443.758697][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.801974][T11304] device bridge_slave_0 left promiscuous mode [ 443.808220][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.862410][T11304] device bridge_slave_1 left promiscuous mode [ 443.868662][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.901668][T11304] device bridge_slave_0 left promiscuous mode [ 443.907925][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.952974][T11304] device bridge_slave_1 left promiscuous mode [ 443.959183][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.041569][T11304] device bridge_slave_0 left promiscuous mode [ 444.047837][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.643813][T11304] device hsr_slave_1 left promiscuous mode [ 451.689260][T11304] device hsr_slave_0 left promiscuous mode [ 451.735617][T11304] device team_slave_1 left promiscuous mode [ 451.745009][T11304] team0 (unregistering): Port device team_slave_1 removed [ 451.757311][T11304] device team_slave_0 left promiscuous mode [ 451.765744][T11304] team0 (unregistering): Port device team_slave_0 removed [ 451.778519][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 451.828223][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 451.913591][T11304] bond0 (unregistering): Released all slaves [ 452.082832][T11304] device hsr_slave_1 left promiscuous mode [ 452.136732][T11304] device hsr_slave_0 left promiscuous mode [ 452.196827][T11304] team0 (unregistering): Port device team_slave_1 removed [ 452.208894][T11304] team0 (unregistering): Port device team_slave_0 removed [ 452.222444][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 452.277525][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 452.378400][T11304] bond0 (unregistering): Released all slaves [ 452.532809][T11304] device hsr_slave_1 left promiscuous mode [ 452.586963][T11304] device hsr_slave_0 left promiscuous mode [ 452.646177][T11304] team0 (unregistering): Port device team_slave_1 removed [ 452.658324][T11304] team0 (unregistering): Port device team_slave_0 removed [ 452.672734][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 452.709700][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 452.789309][T11304] bond0 (unregistering): Released all slaves [ 452.934478][T11304] device hsr_slave_1 left promiscuous mode [ 452.996444][T11304] device hsr_slave_0 left promiscuous mode [ 453.036601][T11304] team0 (unregistering): Port device team_slave_1 removed [ 453.048799][T11304] team0 (unregistering): Port device team_slave_0 removed [ 453.060994][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 453.088891][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 453.189643][T11304] bond0 (unregistering): Released all slaves [ 453.363780][T20686] device hsr_slave_0 entered promiscuous mode [ 453.422840][T20686] device hsr_slave_1 entered promiscuous mode [ 453.483891][T20683] 8021q: adding VLAN 0 to HW filter on device bond0 [ 453.527593][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 453.535719][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 453.590800][T20683] 8021q: adding VLAN 0 to HW filter on device team0 [ 453.681498][T20589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 453.690820][T20589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 453.699268][T20589] bridge0: port 1(bridge_slave_0) entered blocking state [ 453.706391][T20589] bridge0: port 1(bridge_slave_0) entered forwarding state [ 453.715014][T20589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 453.793706][T20694] chnl_net:caif_netlink_parms(): no params data found [ 453.823268][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 453.833014][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 453.842031][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 453.849101][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 453.857398][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 453.866606][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 453.876021][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 453.884901][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 453.894308][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 453.913278][T20693] chnl_net:caif_netlink_parms(): no params data found [ 453.979741][T20683] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 453.991064][T20683] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 454.008552][T20687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 454.034499][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 454.044868][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 454.054040][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 454.062933][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 454.072272][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 454.081120][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 454.090608][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 454.111459][T20686] 8021q: adding VLAN 0 to HW filter on device bond0 [ 454.127492][T20694] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.135646][T20694] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.143721][T20694] device bridge_slave_0 entered promiscuous mode [ 454.152389][T20694] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.159628][T20694] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.169178][T20694] device bridge_slave_1 entered promiscuous mode [ 454.184323][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 454.192915][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 454.214484][T20687] 8021q: adding VLAN 0 to HW filter on device team0 [ 454.229271][T20686] 8021q: adding VLAN 0 to HW filter on device team0 [ 454.251969][T20693] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.259077][T20693] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.267397][T20693] device bridge_slave_0 entered promiscuous mode [ 454.279239][T20693] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.287173][T20693] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.295664][T20693] device bridge_slave_1 entered promiscuous mode [ 454.303500][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 454.312372][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 454.320050][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 454.329303][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 454.338466][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.345580][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 454.354430][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 454.373468][T20694] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 454.398063][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 454.407692][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 454.416328][T13842] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.423553][T13842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 454.432378][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 454.441228][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 454.449580][T13842] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.456689][T13842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 454.464598][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 454.474138][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 454.482919][T13842] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.489965][T13842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 454.497705][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 454.507585][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 454.518729][T20694] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 454.556319][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 454.567272][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 454.583976][T20683] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 454.595511][T20693] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 454.641495][T20693] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 454.650561][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 454.659438][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 454.669080][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 454.678131][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 454.687414][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 454.698242][T20694] team0: Port device team_slave_0 added [ 454.746672][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 454.765298][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 454.778345][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 454.788305][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 454.799195][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 454.807778][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 454.817268][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 454.825997][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 454.834924][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 454.843516][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 454.854710][T20694] team0: Port device team_slave_1 added [ 454.868772][T20687] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 454.881667][T20687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 454.892863][T20693] team0: Port device team_slave_0 added [ 454.962754][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 454.973125][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 454.989462][T20686] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 455.002350][T20686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 455.012679][T20693] team0: Port device team_slave_1 added [ 455.118855][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 455.134656][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 455.207718][T20687] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 455.263895][T20694] device hsr_slave_0 entered promiscuous mode [ 455.330729][T20694] device hsr_slave_1 entered promiscuous mode 18:45:49 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x11x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 18:45:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e0000002b008182e45ae087185082cf0324b0eba06ef9075b3f00169148790700d90080e2300000000020000000", 0x2e}], 0x1}, 0x0) [ 455.453968][T20693] device hsr_slave_0 entered promiscuous mode [ 455.571209][T20693] device hsr_slave_1 entered promiscuous mode [ 455.604868][T20686] 8021q: adding VLAN 0 to HW filter on device batadv0 18:45:49 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x11, 0xa, 0x300) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r1, 0x88, 0xb, &(0x7f0000000100)=r0, 0x4) [ 455.886353][T20694] 8021q: adding VLAN 0 to HW filter on device bond0 [ 456.001329][T20693] 8021q: adding VLAN 0 to HW filter on device bond0 [ 456.032877][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 456.044452][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 456.051151][T20721] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 456.058616][T20694] 8021q: adding VLAN 0 to HW filter on device team0 [ 456.099552][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 456.110591][T20721] CPU: 1 PID: 20721 Comm: syz-executor.3 Not tainted 5.1.0+ #1 [ 456.118165][T20721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.128646][T20721] Call Trace: [ 456.131957][T20721] dump_stack+0x172/0x1f0 [ 456.136409][T20721] dump_header+0x10f/0xb6c [ 456.140840][T20721] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 456.146654][T20721] ? ___ratelimit+0x60/0x595 [ 456.151342][T20721] ? do_raw_spin_unlock+0x57/0x270 [ 456.156462][T20721] oom_kill_process.cold+0x10/0x15 [ 456.161591][T20721] out_of_memory+0x79a/0x1280 [ 456.166287][T20721] ? cgroup_file_notify+0x140/0x1b0 [ 456.171497][T20721] ? oom_killer_disable+0x280/0x280 [ 456.177401][T20721] ? cgroup_file_notify+0x140/0x1b0 [ 456.182617][T20721] mem_cgroup_out_of_memory+0x1ca/0x230 [ 456.188173][T20721] ? memcg_event_wake+0x230/0x230 [ 456.193221][T20721] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 456.199047][T20721] ? cgroup_file_notify+0x140/0x1b0 [ 456.204266][T20721] memory_max_write+0x169/0x300 [ 456.209134][T20721] ? mem_cgroup_write+0x360/0x360 [ 456.214165][T20721] ? lock_acquire+0x16f/0x3f0 [ 456.218851][T20721] ? kernfs_fop_write+0x227/0x480 [ 456.223893][T20721] cgroup_file_write+0x241/0x790 [ 456.228837][T20721] ? mem_cgroup_write+0x360/0x360 [ 456.233871][T20721] ? init_and_link_css+0x860/0x860 [ 456.238998][T20721] ? init_and_link_css+0x860/0x860 [ 456.244116][T20721] kernfs_fop_write+0x2b8/0x480 [ 456.248991][T20721] __vfs_write+0x8a/0x110 [ 456.253330][T20721] ? kernfs_fop_open+0xd80/0xd80 [ 456.258286][T20721] vfs_write+0x20c/0x580 [ 456.262542][T20721] ksys_write+0x14f/0x290 [ 456.266881][T20721] ? __ia32_sys_read+0xb0/0xb0 [ 456.271656][T20721] ? do_syscall_64+0x26/0x680 [ 456.276340][T20721] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.282414][T20721] ? do_syscall_64+0x26/0x680 [ 456.287104][T20721] __x64_sys_write+0x73/0xb0 [ 456.291709][T20721] do_syscall_64+0xfd/0x680 [ 456.296225][T20721] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.302127][T20721] RIP: 0033:0x459279 [ 456.306034][T20721] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 456.325642][T20721] RSP: 002b:00007f817003fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 456.334060][T20721] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 456.342037][T20721] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 456.350022][T20721] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 456.358005][T20721] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81700406d4 [ 456.365986][T20721] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 456.398488][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 456.429949][T20693] 8021q: adding VLAN 0 to HW filter on device team0 [ 456.436773][T20721] memory: usage 7408kB, limit 0kB, failcnt 46 18:45:50 executing program 5: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0xc6) gettid() bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) close(r0) socketpair(0x0, 0x80000, 0x10000, 0x0) [ 456.452563][T20721] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 456.463181][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 456.481084][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 456.489484][T20721] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 456.502921][ T3484] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.510000][ T3484] bridge0: port 1(bridge_slave_0) entered forwarding state [ 456.519099][T20721] Memory cgroup stats for /syz3: cache:32KB rss:4172KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4172KB inactive_file:0KB active_file:0KB unevictable:0KB [ 456.544628][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 456.562875][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 456.586799][ T3484] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.593942][ T3484] bridge0: port 2(bridge_slave_1) entered forwarding state [ 456.619199][T20721] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=20718,uid=0 [ 456.669661][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 456.690927][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 456.699385][T20721] Memory cgroup out of memory: Killed process 20718 (syz-executor.3) total-vm:72712kB, anon-rss:4240kB, file-rss:35772kB, shmem-rss:0kB [ 456.716033][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 456.742807][ T1042] oom_reaper: reaped process 20718 (syz-executor.3), now anon-rss:0kB, file-rss:34812kB, shmem-rss:0kB [ 456.761057][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 456.769568][ T3484] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.776689][ T3484] bridge0: port 1(bridge_slave_0) entered forwarding state [ 456.825340][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 456.851336][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 456.870701][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 456.891477][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 456.899628][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 456.950046][T20738] IPVS: ftp: loaded support on port[0] = 21 [ 456.974649][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 456.991363][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 457.000067][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 457.008751][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 457.017242][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 457.025739][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 457.034180][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 457.043039][ T3484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 457.052001][ T3484] bridge0: port 2(bridge_slave_1) entered blocking state [ 457.059056][ T3484] bridge0: port 2(bridge_slave_1) entered forwarding state [ 457.075819][T20694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 18:45:50 executing program 5: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0xc6) gettid() bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) close(r0) socketpair(0x0, 0x80000, 0x10000, 0x0) 18:45:50 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x11, 0xa, 0x300) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r1, 0x88, 0xb, &(0x7f0000000100)=r0, 0x4) 18:45:50 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0xc6) gettid() bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) close(r0) socketpair(0x0, 0x80000, 0x10000, 0x0) [ 457.104477][T20687] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 457.143980][T20687] CPU: 0 PID: 20687 Comm: syz-executor.3 Not tainted 5.1.0+ #1 [ 457.151563][T20687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.162585][T20687] Call Trace: [ 457.165896][T20687] dump_stack+0x172/0x1f0 [ 457.170269][T20687] dump_header+0x10f/0xb6c [ 457.174702][T20687] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 457.180518][T20687] ? ___ratelimit+0x60/0x595 [ 457.185123][T20687] ? do_raw_spin_unlock+0x57/0x270 [ 457.190259][T20687] oom_kill_process.cold+0x10/0x15 [ 457.195406][T20687] out_of_memory+0x79a/0x1280 [ 457.200089][T20687] ? lock_downgrade+0x880/0x880 [ 457.204938][T20687] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 457.211369][T20687] ? oom_killer_disable+0x280/0x280 [ 457.216570][T20687] ? find_held_lock+0x35/0x130 [ 457.221347][T20687] mem_cgroup_out_of_memory+0x1ca/0x230 [ 457.226915][T20687] ? memcg_event_wake+0x230/0x230 [ 457.231949][T20687] ? do_raw_spin_unlock+0x57/0x270 [ 457.237166][T20687] ? _raw_spin_unlock+0x2d/0x50 [ 457.242035][T20687] try_charge+0x102c/0x15c0 [ 457.246566][T20687] ? find_held_lock+0x35/0x130 [ 457.251344][T20687] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 457.256982][T20687] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 457.263225][T20687] ? kasan_check_read+0x11/0x20 [ 457.268098][T20687] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 457.273649][T20687] mem_cgroup_try_charge+0x24d/0x5e0 [ 457.278950][T20687] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 457.284592][T20687] wp_page_copy+0x416/0x1770 [ 457.289190][T20687] ? do_wp_page+0x5d0/0x16c0 [ 457.293788][T20687] ? pmd_pfn+0x1d0/0x1d0 [ 457.298043][T20687] ? lock_downgrade+0x880/0x880 [ 457.302895][T20687] ? swp_swapcount+0x540/0x540 [ 457.307660][T20687] ? kasan_check_read+0x11/0x20 [ 457.312515][T20687] ? do_raw_spin_unlock+0x57/0x270 [ 457.317628][T20687] do_wp_page+0x5d8/0x16c0 [ 457.322048][T20687] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 457.327432][T20687] __handle_mm_fault+0x22e3/0x3eb0 [ 457.332554][T20687] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 457.338103][T20687] ? find_held_lock+0x35/0x130 [ 457.342869][T20687] ? handle_mm_fault+0x322/0xb30 [ 457.347815][T20687] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 457.354064][T20687] ? kasan_check_read+0x11/0x20 [ 457.358924][T20687] handle_mm_fault+0x43f/0xb30 [ 457.363694][T20687] __do_page_fault+0x5ef/0xda0 [ 457.368507][T20687] do_page_fault+0x71/0x57d [ 457.373014][T20687] ? page_fault+0x8/0x30 [ 457.377275][T20687] page_fault+0x1e/0x30 [ 457.381693][T20687] RIP: 0033:0x430356 [ 457.385674][T20687] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 457.405288][T20687] RSP: 002b:00007ffe96e424c0 EFLAGS: 00010206 [ 457.411380][T20687] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 457.419388][T20687] RDX: 0000000000b13930 RSI: 0000000000b1b970 RDI: 0000000000000003 [ 457.427381][T20687] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000000b12940 [ 457.435388][T20687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 457.443375][T20687] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 457.452571][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 457.458357][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 457.460553][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 457.464820][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 457.469835][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 457.475618][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 457.500698][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 457.506514][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 457.536556][T20687] memory: usage 2896kB, limit 0kB, failcnt 58 [ 457.540029][T20694] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 457.548118][T20687] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 457.560734][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 457.569683][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 457.570747][T20687] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 457.587016][T20687] Memory cgroup stats for /syz3: cache:32KB rss:4KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4KB inactive_file:0KB active_file:0KB unevictable:0KB [ 457.589977][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 457.607416][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 457.607475][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 457.608172][T20687] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=20687,uid=0 [ 457.642485][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 457.644067][T20687] Memory cgroup out of memory: Killed process 20687 (syz-executor.3) total-vm:72448kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 457.662805][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 457.686030][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 18:45:51 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x11, 0xa, 0x300) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r1, 0x88, 0xb, &(0x7f0000000100)=r0, 0x4) [ 457.703913][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 457.712957][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 18:45:51 executing program 5: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0xc6) gettid() bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) close(r0) socketpair(0x0, 0x80000, 0x10000, 0x0) [ 457.887707][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 457.898315][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 18:45:51 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x11, 0xa, 0x300) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r1, 0x88, 0xb, &(0x7f0000000100)=r0, 0x4) [ 457.948502][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 457.975523][T20693] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 458.145097][T20693] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 458.243222][T20738] chnl_net:caif_netlink_parms(): no params data found [ 458.405661][T20738] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.430394][T20738] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.460756][T20738] device bridge_slave_0 entered promiscuous mode [ 458.480831][T20738] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.500634][T20738] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.525838][T20738] device bridge_slave_1 entered promiscuous mode [ 458.698933][T20738] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 458.726816][T20738] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 458.764676][T20738] team0: Port device team_slave_0 added [ 458.793511][T20738] team0: Port device team_slave_1 added [ 458.883770][T20738] device hsr_slave_0 entered promiscuous mode [ 458.930804][T20738] device hsr_slave_1 entered promiscuous mode 18:45:52 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:45:52 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0xceb2, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) 18:45:52 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0xc6) gettid() bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) close(r0) socketpair(0x0, 0x80000, 0x10000, 0x0) [ 459.245156][T20738] 8021q: adding VLAN 0 to HW filter on device bond0 [ 459.285224][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 459.301788][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 459.368347][T20738] 8021q: adding VLAN 0 to HW filter on device team0 [ 459.388955][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 459.398502][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 459.422105][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.429208][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 459.463999][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 459.472647][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 459.482405][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 459.492274][T13842] bridge0: port 2(bridge_slave_1) entered blocking state [ 459.499347][T13842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 459.509028][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 459.546939][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 459.561995][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 459.575970][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 459.586355][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 459.609639][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 459.619043][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 459.627886][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 459.637120][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 459.660098][T20738] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 459.685697][T20738] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 459.707806][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 459.731089][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 459.766610][T20738] 8021q: adding VLAN 0 to HW filter on device batadv0 18:45:53 executing program 0: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:45:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 18:45:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0xe, &(0x7f0000000080), 0x384) 18:45:53 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0xceb2, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) 18:45:53 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) [ 460.097781][T20794] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:45:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0xe, &(0x7f0000000080), 0x384) 18:45:53 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0xceb2, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) 18:45:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0xe, &(0x7f0000000080), 0x384) 18:45:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 18:45:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0xe, &(0x7f0000000080), 0x384) 18:45:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 462.222006][T20829] IPVS: ftp: loaded support on port[0] = 21 [ 464.415247][T20829] chnl_net:caif_netlink_parms(): no params data found [ 464.455634][T20829] bridge0: port 1(bridge_slave_0) entered blocking state [ 464.463770][T20829] bridge0: port 1(bridge_slave_0) entered disabled state [ 464.471720][T20829] device bridge_slave_0 entered promiscuous mode [ 464.480819][T20829] bridge0: port 2(bridge_slave_1) entered blocking state [ 464.487980][T20829] bridge0: port 2(bridge_slave_1) entered disabled state [ 464.496343][T20829] device bridge_slave_1 entered promiscuous mode [ 465.024863][T20829] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 465.035659][T20829] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 465.057406][T20829] team0: Port device team_slave_0 added [ 465.574407][T20829] team0: Port device team_slave_1 added [ 465.643814][T20829] device hsr_slave_0 entered promiscuous mode [ 465.680736][T20829] device hsr_slave_1 entered promiscuous mode [ 466.769634][T11304] device bridge_slave_1 left promiscuous mode [ 466.777121][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.821728][T11304] device bridge_slave_0 left promiscuous mode [ 466.827929][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.882610][T11304] device bridge_slave_1 left promiscuous mode [ 466.888843][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.941856][T11304] device bridge_slave_0 left promiscuous mode [ 466.948094][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.002792][T11304] device bridge_slave_1 left promiscuous mode [ 467.009034][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.041775][T11304] device bridge_slave_0 left promiscuous mode [ 467.048005][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.111883][T11304] device bridge_slave_1 left promiscuous mode [ 467.118077][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.161797][T11304] device bridge_slave_0 left promiscuous mode [ 467.168041][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.212755][T11304] device bridge_slave_1 left promiscuous mode [ 467.219054][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.281122][T11304] device bridge_slave_0 left promiscuous mode [ 467.287323][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.342051][T11304] device bridge_slave_1 left promiscuous mode [ 467.348228][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.401051][T11304] device bridge_slave_0 left promiscuous mode [ 467.407221][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.451786][T11304] device bridge_slave_1 left promiscuous mode [ 467.457956][T11304] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.521855][T11304] device bridge_slave_0 left promiscuous mode [ 467.528097][T11304] bridge0: port 1(bridge_slave_0) entered disabled state [ 480.712531][T11304] device hsr_slave_1 left promiscuous mode [ 480.766372][T11304] device hsr_slave_0 left promiscuous mode [ 480.833814][T11304] team0 (unregistering): Port device team_slave_1 removed [ 480.846253][T11304] team0 (unregistering): Port device team_slave_0 removed [ 480.859718][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 480.924865][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 481.015303][T11304] bond0 (unregistering): Released all slaves [ 481.144121][T11304] device hsr_slave_1 left promiscuous mode [ 481.187246][T11304] device hsr_slave_0 left promiscuous mode [ 481.226938][T11304] team0 (unregistering): Port device team_slave_1 removed [ 481.238865][T11304] team0 (unregistering): Port device team_slave_0 removed [ 481.254088][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 481.296278][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 481.403507][T11304] bond0 (unregistering): Released all slaves [ 481.553803][T11304] device hsr_slave_1 left promiscuous mode [ 481.607358][T11304] device hsr_slave_0 left promiscuous mode [ 481.666066][T11304] team0 (unregistering): Port device team_slave_1 removed [ 481.678065][T11304] team0 (unregistering): Port device team_slave_0 removed [ 481.689860][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 481.728145][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 481.822317][T11304] bond0 (unregistering): Released all slaves [ 481.954097][T11304] device hsr_slave_1 left promiscuous mode [ 481.996278][T11304] device hsr_slave_0 left promiscuous mode [ 482.055851][T11304] team0 (unregistering): Port device team_slave_1 removed [ 482.069867][T11304] team0 (unregistering): Port device team_slave_0 removed [ 482.083123][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 482.116710][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 482.209931][T11304] bond0 (unregistering): Released all slaves [ 482.323138][T11304] device hsr_slave_1 left promiscuous mode [ 482.384582][T11304] device hsr_slave_0 left promiscuous mode [ 482.444198][T11304] team0 (unregistering): Port device team_slave_1 removed [ 482.460133][T11304] team0 (unregistering): Port device team_slave_0 removed [ 482.474068][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 482.526523][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 482.615302][T11304] bond0 (unregistering): Released all slaves [ 482.783158][T11304] device hsr_slave_1 left promiscuous mode [ 482.836469][T11304] device hsr_slave_0 left promiscuous mode [ 482.885315][T11304] team0 (unregistering): Port device team_slave_1 removed [ 482.901080][T11304] team0 (unregistering): Port device team_slave_0 removed [ 482.913182][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 482.977429][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 483.057159][T11304] bond0 (unregistering): Released all slaves [ 483.224025][T11304] device hsr_slave_1 left promiscuous mode [ 483.277383][T11304] device hsr_slave_0 left promiscuous mode [ 483.335975][T11304] team0 (unregistering): Port device team_slave_1 removed [ 483.347917][T11304] team0 (unregistering): Port device team_slave_0 removed [ 483.359555][T11304] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 483.398350][T11304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 483.496765][T11304] bond0 (unregistering): Released all slaves [ 483.628378][T20829] 8021q: adding VLAN 0 to HW filter on device bond0 [ 483.644789][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 483.653344][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 483.665684][T20829] 8021q: adding VLAN 0 to HW filter on device team0 [ 483.674830][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 483.684230][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 483.693302][ T8878] bridge0: port 1(bridge_slave_0) entered blocking state [ 483.700437][ T8878] bridge0: port 1(bridge_slave_0) entered forwarding state [ 483.722318][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 483.730833][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 483.739566][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 483.748950][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 483.756050][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 483.766681][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 483.775356][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 483.784167][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 483.793674][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 483.803747][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 483.821956][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 483.831903][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 483.842081][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 483.850927][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 483.864206][T20829] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 483.876239][T20829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 483.884768][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 483.893315][T13842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 483.919624][T20829] 8021q: adding VLAN 0 to HW filter on device batadv0 18:46:17 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0xc6) gettid() bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) close(r0) socketpair(0x0, 0x80000, 0x10000, 0x0) 18:46:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 18:46:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 18:46:17 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 18:46:17 executing program 0: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 18:46:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 18:46:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 18:46:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 18:46:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 18:46:18 executing program 0: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 18:46:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 18:46:18 executing program 4: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 18:46:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 18:46:19 executing program 0: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:19 executing program 2: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:19 executing program 4: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 18:46:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 18:46:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 18:46:20 executing program 0: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000300)=0x9) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2000}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 18:46:20 executing program 3: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:20 executing program 4: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:20 executing program 2: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:20 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:20 executing program 5: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:20 executing program 3: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:20 executing program 0: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0x1) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x6) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="000700000000000000ff010000a9bb000001"]) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc020660b, 0x20000001) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x6611, 0x0) 18:46:21 executing program 2: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:21 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:21 executing program 3: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:21 executing program 5: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:21 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002600)}, {0x0}], 0x2}, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000008540)={0x0, 0x0, 0x0}, 0x0) [ 487.958560][T21062] __nla_validate_parse: 4 callbacks suppressed [ 487.958596][T21062] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. [ 488.049859][T21064] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. 18:46:21 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002600)}, {0x0}], 0x2}, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="fa0c000026008152915a655267d7d137ab2ff96e27bf28b285fe3903a44a6017edcaa3a2b4dade3baee72569b51366463fedf5e787c05b0cb5927a3a7edfb4d078e9ae1504d489e058be9fafaa633705b6d4bf6a01f2cd9ebf19724a1b0b9760612582bccd3983ce4474844c065e914dab8bbd52a45f431678bfe28633bf7c8dc83df809238ed87f1e393883ef750ce79c6f84e5e5de176e2f26024e4e3a3d8fbdaf3254022f265d8ccc5fd7205d9d9c2c407ec58162523082d81a39c43f782332ba8e82b4107a049cb82bba8b5edd80473844291437b8d22edca68047582e6be601e9df5e60a32c7cd202c5a30b8b606e43362739551cbb013b65e238f41cc00d7900140cf06b7bc9030f2563bcf9d4f4b7f48c79ec1a323d06276a0a3f8846b7c62b66f9709cabcaad234c53f3bc9b11165a6321f1db1057f076cfaebf8fbfa033fdc1dc2c3e314b36b3b3dd50425447da8bc5938ff7a17361100ab0b1ffeab7ac487411824224781eb9cdd4edef57ae91cd61f56a56c0599cfc3a491447207610f242da6cd6b030ae5f35e3181c44ae68665a023759b9ef4358db46107edc49194aed72b62600ec0ae4fc9065be059fc010cd6e6c9ea77c666b5e25693fbcf595e3e57113ff3a0e0c63d0604a16ea5adb8b7b54d47d4d8804612fde571863064528a49bf684d8a880a11afd819f186c177c49cac3ba1e9d1aa7ad0ff36b9e36d73c05b8abcaf96df0bacd2c9653f30ec29e1284af8749a9b2803c2727e992a6e65df192e1875c3e6d3553ffb7cb34ffee8f8ac0123c390454b42a0316952cbc9949376d9320ec207f77c2d5eb9e86d720cf8e9008a9a51932b45cd4cab21414c92d1c20f9e15e3fc16c7ce181e9ab19b01b70343934c823b1215e173405dd225233823cd4a604a77f06b14eb05b860e6cf8790335788c43abe9de1598e9952e5c7e6b2f8b17b1788ff3033e7d1635b008834bdf4054e6195e55000827c6202b227dde06f23ae21c00b371bdb6b7ea47b2e78844b52a77f9f0929790dcd7df2752e4af092d539c87c18751a5eb3eb4d38a2a0e070064b4ffaacff0543b115cc89f6c7e78f12147ebfcf1c80bac8f98deb59cbe670adb4cd1882a7e0ca4ba85ae9d445223ffb32301d46c0c9b05a830cbea0f72294ab3b539e4ed7cac2e22b235e8ceedeb643fb90b061a58368e76036ff3c1828d8a4e21288662afb6f2acab00d734db7ffc8373a928571819ce9ea6cb0956a6093b2b1f65662b76bc6ac8a171451714e1d0e4ff7647fe7551d3cf16f37cb5547317e4fef51e4fb471de6ffbb90c2dd4a64266c4c2f75fc62e58ec306fb92212fb262d8b138899a3b53e67cde2f97d94cd2265cc04d32b29edf77e75b1f88372495cb2937f183bfc8604d72efb3af5c1f41b665b25592676b0ad2185478eade7e663e743e0e09cce6224c787ce1d789dc4a9b350bfe3a75f551341b11dd96cdaea17989dad565b16324a69842dc29a0ed16744ea5935598ac8238e146139189927a14d3b2863044b63b468ae75f48fab68ad235c36daffebfe4b468fc9b13198b1a683dcd3b3b4294ba22caddbacf8792d5783bc12e2538e4609e6bb6e9eeab98a06452c252a657f400260458c29fae8879097698c9aba2b2d889fc78f00d0d8271e09e8542b71018be6ff8cb03cb423e79303047d6ce124a00f64461b899bbddc4fe87ff677533391e16c01fa9cd6420bdc856c4c7f057b249ee9817efd6ab2cd02eb887d2631435ef2d5a1c7e57ac046ef615a1285ca89ade18ae69af3b3f8f76ca8aa060e373c0f99424fe1c5fadc72fe145fd2d4e4da4b78597890516857de188fcdaf15e3b0871b346cd39ab772cc25fab49e60c818cde934b137144adfc4fbde3ddbeccce9679f02b66746e822c67b3ed5fdafb4a936a2683b39a002115ecd62220605ca542610a80f2e3530aa89d3ed6ed9c57bbfd5db3a0b62786a608309a355443c616032008f9458b2f10db93e29470192370084e9322c309c9b23333b46d04e79176659503ad4b05deebb3c67d715ee6e84a89002ea6f7f71bf41ad36b42c8ae01c97174dbb641e50641aba60c291a84e906c013087370a5043e07d36fcead378f6c1e6ed3f5ac695124b82b20261cf7c9b82172e09c81d7d39eed72aee5678613a3c671ddd44f2c7c75a3b5d316aa165d56594fccab20903d7f503a08928e76c779918b2463b720ee6367a43e494a1db3ed1a80690e665570c01ce7eb979cdd95d4e1ca51730eb2cd63ffb2a56049601627c9788254945142dce85adbe1eb5997d16cdfe2a3758b13dc6bb121e2206ae64206868c1c5e89a101bc121719ac435dcad093f5f67cefd863cc7c8f3fc8a9dc62a83c115f1ce714b18af067951aa06dd9bb4ed98a820bf4704d156977caa4e6415b2a0df0386e2f6a061bf44abc8a397cf4abdafc51b78ebec9831f3c60fde6e62a1fd082903080aef20ff8de8bc0dced06f627514600539ca7114a088848da4244a85b4cf5b976d3a698c9a568d417e276917baba05d1a02181db2e6cc35986da4ccc63f8cd8e85a4a923dd27e2f499664601fdc44fdf46e2d2880cd5a7ece89c370234c438dcc0b43865cc62bad21e9dc37da758cbe01752f02fd9cbfe98630a30a78bb1239e25cdaba3d45d13cd3e7216d9d8070f3ff1a0cd9a0c91f29974c98f2677ba88c1091bde4be0cd37ea5eeb3b9cd59560a00ddd40bbd60ffb8d4daa973ef0977c18dd4b38a605cee957872dca85787c37b6931293eddb77015faf143d1d28d24822d1a5d134799e8175a38b255aaf0e39b68c7f734e2e1e7044626daa84c9113e86d86ef63c863703703ea163319261dcf516c32d49478f7af30d52baa18ea6b0fc286c06b7e4ee019bf3fe74845a652d4a52aaa241a189c411e90e2953863a2bc4124e573607b94cdff19e280731824931a83f056cb5857672619b97ce38081592c0c319ce72e04e9eadce89775cfb5a4b2842663bc79bde565435cbcd46c4d505ceef7dde86512d39d4cb270deb7e79ebf8602bdc0d76c3e833d36ee08be10be634f44056c2f3fd6a328c7cd562e9c96ff7845fc3df81a876bb07f1cc833bed6ca1dc5cf935a4e959db6a4fae6edbc45357d8758faa9cd04cd41eb6efcfbd91658519bf520b90107f767d126854818485e98cb7ef56804de6950bf4e72098a949d14ea0e4e9f2534cf16cac0aeb970fc5c39f37e93910d5c99ac163792260d2280ec5c9a79bf295588ec23f524aae65f800f9c39e338f3d66b1a69e5488e04823eab36ae6ec6a2c5ce133ccd819a2b217b1ab7f4afd1697bb42929b3131358b5421c83f925571934442d0fd0ce3990d4e5d31d8b956f76df3c2f8533e46b892c88692ce009155dd5c7dbe4c86874b95762650f63e4b4aabb41320978b05b80cfe8fa2830904ef6b5c4f7ad46ca5dac151c9077c4d2c6adfe5066a8eb09a9bc6892330ea2b259a53c7137f8498254e1b04bf920c35c5333c4d640b11da60917ae921037b4aedbd6a0fbeeaf88ef6defc830552b4cbe3fe2a844806a48923dd428ea1c8d797bd8e6aabd1d1a8c97c8038b627120a77f4e47fa1f788aa9da268b0ec10fc453cb722685df76547dbf55a16663aa2b2a51e9c52456cccdf682592d1369dd12e3d3cb504e0f2d7004e62c297d5a25d0298045dae8fca8cb795ea57288b85a7e705820087d55ca6c42e920e2aa1174e128622cf64a197fd728cb2949536ba63e8bda8589261f1377caea37302e47228d3708a5666c66ba711d3c0b310a8c47e86d26597299d523c28c90e4feab43e950f398f7b61ccf7e6490d75ba6d8214e2d5ef2d7a088db490e1ebacf4e6eecc896cb1c704f0a8fcdf4ccb5dfa53eaf43d709287f36c10188c19fd59da7d73494de089c1b0a69ee22dcb847001c5317846a876bee1685d11c4db0673ec4c3a12008bb719650525b3c39e2b0469edda93830b3f1bde3e5b0b4637197866bb08c5858cf0d9876e3c7cad54169887bf9c80f9f4be362e1bc8c27f3434e9a918bac355c184bd899b9aebe6be20e70c0c69234342eb8b57aa9ffb7797a32df91cec2bbc90201658ca2297bf1fe68e65363867e1f6ad79b827f363d64fbd3b188d95307d011c4ce5bf4407908c058eeb97ec98dd0ebfdab6b348fa387f2a7573cac25344c983e8fd526c30ee6d59fe99a30c7d7e2864aa22bfa49df5f32da68309cab3ed9c2ce69b6ecb8508ce28a43ebd6c809b8afd07a4606e664965d316f3707a3abee9bcdc32a78031b0171fb565d90c16cd56e5792c0cf618b799715f32538e38f493d4e19ec76fc8a07576a13975706bfc2bb1516c2d18a4385cc37a206eac6c9fb8d073572ba2671d2198abf24fdd0c40d079ae44962c26743b4bf5950ac5ee34c5d7bd60b364ce670958112c37b9829bed7e1327356d6b94af3ba020c2337b2dba37d00af8a128a614390cdde62ce871f948427fb5c187df9a1540a5cc71da1a86144acbfd94bf433f744f0c4f2a675eba3ed251c5b11b08dfefc726c0394a9b75121d88467ed4b2cd69819dfe50693a4a4c8370d3af12f41c0067283bbb5a90044a340fc357a11081a6c13bb9c32d9caa448479fd5f0302b6729ca7233094540b14546d6bcc15771c2686279b34f9c0914f5306d0fabd5979266ea01a17a22507e560dbf904dd62c40e2bccb468710ee4c1caf4e786", 0xcfa}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000008540)={0x0, 0x0, 0x0}, 0x0) [ 488.145166][T21062] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. 18:46:21 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0x1) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x6) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="000700000000000000ff010000a9bb000001"]) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc020660b, 0x20000001) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x6611, 0x0) [ 488.361323][T21072] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. 18:46:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x3, &(0x7f0000519fa8), &(0x7f0000c43000)='syzkaller\x00', 0x0, 0x1000, &(0x7f00001f7000)=""/4096, 0x0, 0x0, [0xffffffc0, 0x2]}, 0x48) [ 488.415108][T21075] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. 18:46:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6}]}}, &(0x7f0000001240)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 18:46:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x3, &(0x7f0000519fa8), &(0x7f0000c43000)='syzkaller\x00', 0x0, 0x1000, &(0x7f00001f7000)=""/4096, 0x0, 0x0, [0xffffffc0, 0x2]}, 0x48) 18:46:22 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002600)}, {0x0}], 0x2}, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="fa0c000026008152915a655267d7d137ab2ff96e27bf28b285fe3903a44a6017edcaa3a2b4dade3baee72569b51366463fedf5e787c05b0cb5927a3a7edfb4d078e9ae1504d489e058be9fafaa633705b6d4bf6a01f2cd9ebf19724a1b0b9760612582bccd3983ce4474844c065e914dab8bbd52a45f431678bfe28633bf7c8dc83df809238ed87f1e393883ef750ce79c6f84e5e5de176e2f26024e4e3a3d8fbdaf3254022f265d8ccc5fd7205d9d9c2c407ec58162523082d81a39c43f782332ba8e82b4107a049cb82bba8b5edd80473844291437b8d22edca68047582e6be601e9df5e60a32c7cd202c5a30b8b606e43362739551cbb013b65e238f41cc00d7900140cf06b7bc9030f2563bcf9d4f4b7f48c79ec1a323d06276a0a3f8846b7c62b66f9709cabcaad234c53f3bc9b11165a6321f1db1057f076cfaebf8fbfa033fdc1dc2c3e314b36b3b3dd50425447da8bc5938ff7a17361100ab0b1ffeab7ac487411824224781eb9cdd4edef57ae91cd61f56a56c0599cfc3a491447207610f242da6cd6b030ae5f35e3181c44ae68665a023759b9ef4358db46107edc49194aed72b62600ec0ae4fc9065be059fc010cd6e6c9ea77c666b5e25693fbcf595e3e57113ff3a0e0c63d0604a16ea5adb8b7b54d47d4d8804612fde571863064528a49bf684d8a880a11afd819f186c177c49cac3ba1e9d1aa7ad0ff36b9e36d73c05b8abcaf96df0bacd2c9653f30ec29e1284af8749a9b2803c2727e992a6e65df192e1875c3e6d3553ffb7cb34ffee8f8ac0123c390454b42a0316952cbc9949376d9320ec207f77c2d5eb9e86d720cf8e9008a9a51932b45cd4cab21414c92d1c20f9e15e3fc16c7ce181e9ab19b01b70343934c823b1215e173405dd225233823cd4a604a77f06b14eb05b860e6cf8790335788c43abe9de1598e9952e5c7e6b2f8b17b1788ff3033e7d1635b008834bdf4054e6195e55000827c6202b227dde06f23ae21c00b371bdb6b7ea47b2e78844b52a77f9f0929790dcd7df2752e4af092d539c87c18751a5eb3eb4d38a2a0e070064b4ffaacff0543b115cc89f6c7e78f12147ebfcf1c80bac8f98deb59cbe670adb4cd1882a7e0ca4ba85ae9d445223ffb32301d46c0c9b05a830cbea0f72294ab3b539e4ed7cac2e22b235e8ceedeb643fb90b061a58368e76036ff3c1828d8a4e21288662afb6f2acab00d734db7ffc8373a928571819ce9ea6cb0956a6093b2b1f65662b76bc6ac8a171451714e1d0e4ff7647fe7551d3cf16f37cb5547317e4fef51e4fb471de6ffbb90c2dd4a64266c4c2f75fc62e58ec306fb92212fb262d8b138899a3b53e67cde2f97d94cd2265cc04d32b29edf77e75b1f88372495cb2937f183bfc8604d72efb3af5c1f41b665b25592676b0ad2185478eade7e663e743e0e09cce6224c787ce1d789dc4a9b350bfe3a75f551341b11dd96cdaea17989dad565b16324a69842dc29a0ed16744ea5935598ac8238e146139189927a14d3b2863044b63b468ae75f48fab68ad235c36daffebfe4b468fc9b13198b1a683dcd3b3b4294ba22caddbacf8792d5783bc12e2538e4609e6bb6e9eeab98a06452c252a657f400260458c29fae8879097698c9aba2b2d889fc78f00d0d8271e09e8542b71018be6ff8cb03cb423e79303047d6ce124a00f64461b899bbddc4fe87ff677533391e16c01fa9cd6420bdc856c4c7f057b249ee9817efd6ab2cd02eb887d2631435ef2d5a1c7e57ac046ef615a1285ca89ade18ae69af3b3f8f76ca8aa060e373c0f99424fe1c5fadc72fe145fd2d4e4da4b78597890516857de188fcdaf15e3b0871b346cd39ab772cc25fab49e60c818cde934b137144adfc4fbde3ddbeccce9679f02b66746e822c67b3ed5fdafb4a936a2683b39a002115ecd62220605ca542610a80f2e3530aa89d3ed6ed9c57bbfd5db3a0b62786a608309a355443c616032008f9458b2f10db93e29470192370084e9322c309c9b23333b46d04e79176659503ad4b05deebb3c67d715ee6e84a89002ea6f7f71bf41ad36b42c8ae01c97174dbb641e50641aba60c291a84e906c013087370a5043e07d36fcead378f6c1e6ed3f5ac695124b82b20261cf7c9b82172e09c81d7d39eed72aee5678613a3c671ddd44f2c7c75a3b5d316aa165d56594fccab20903d7f503a08928e76c779918b2463b720ee6367a43e494a1db3ed1a80690e665570c01ce7eb979cdd95d4e1ca51730eb2cd63ffb2a56049601627c9788254945142dce85adbe1eb5997d16cdfe2a3758b13dc6bb121e2206ae64206868c1c5e89a101bc121719ac435dcad093f5f67cefd863cc7c8f3fc8a9dc62a83c115f1ce714b18af067951aa06dd9bb4ed98a820bf4704d156977caa4e6415b2a0df0386e2f6a061bf44abc8a397cf4abdafc51b78ebec9831f3c60fde6e62a1fd082903080aef20ff8de8bc0dced06f627514600539ca7114a088848da4244a85b4cf5b976d3a698c9a568d417e276917baba05d1a02181db2e6cc35986da4ccc63f8cd8e85a4a923dd27e2f499664601fdc44fdf46e2d2880cd5a7ece89c370234c438dcc0b43865cc62bad21e9dc37da758cbe01752f02fd9cbfe98630a30a78bb1239e25cdaba3d45d13cd3e7216d9d8070f3ff1a0cd9a0c91f29974c98f2677ba88c1091bde4be0cd37ea5eeb3b9cd59560a00ddd40bbd60ffb8d4daa973ef0977c18dd4b38a605cee957872dca85787c37b6931293eddb77015faf143d1d28d24822d1a5d134799e8175a38b255aaf0e39b68c7f734e2e1e7044626daa84c9113e86d86ef63c863703703ea163319261dcf516c32d49478f7af30d52baa18ea6b0fc286c06b7e4ee019bf3fe74845a652d4a52aaa241a189c411e90e2953863a2bc4124e573607b94cdff19e280731824931a83f056cb5857672619b97ce38081592c0c319ce72e04e9eadce89775cfb5a4b2842663bc79bde565435cbcd46c4d505ceef7dde86512d39d4cb270deb7e79ebf8602bdc0d76c3e833d36ee08be10be634f44056c2f3fd6a328c7cd562e9c96ff7845fc3df81a876bb07f1cc833bed6ca1dc5cf935a4e959db6a4fae6edbc45357d8758faa9cd04cd41eb6efcfbd91658519bf520b90107f767d126854818485e98cb7ef56804de6950bf4e72098a949d14ea0e4e9f2534cf16cac0aeb970fc5c39f37e93910d5c99ac163792260d2280ec5c9a79bf295588ec23f524aae65f800f9c39e338f3d66b1a69e5488e04823eab36ae6ec6a2c5ce133ccd819a2b217b1ab7f4afd1697bb42929b3131358b5421c83f925571934442d0fd0ce3990d4e5d31d8b956f76df3c2f8533e46b892c88692ce009155dd5c7dbe4c86874b95762650f63e4b4aabb41320978b05b80cfe8fa2830904ef6b5c4f7ad46ca5dac151c9077c4d2c6adfe5066a8eb09a9bc6892330ea2b259a53c7137f8498254e1b04bf920c35c5333c4d640b11da60917ae921037b4aedbd6a0fbeeaf88ef6defc830552b4cbe3fe2a844806a48923dd428ea1c8d797bd8e6aabd1d1a8c97c8038b627120a77f4e47fa1f788aa9da268b0ec10fc453cb722685df76547dbf55a16663aa2b2a51e9c52456cccdf682592d1369dd12e3d3cb504e0f2d7004e62c297d5a25d0298045dae8fca8cb795ea57288b85a7e705820087d55ca6c42e920e2aa1174e128622cf64a197fd728cb2949536ba63e8bda8589261f1377caea37302e47228d3708a5666c66ba711d3c0b310a8c47e86d26597299d523c28c90e4feab43e950f398f7b61ccf7e6490d75ba6d8214e2d5ef2d7a088db490e1ebacf4e6eecc896cb1c704f0a8fcdf4ccb5dfa53eaf43d709287f36c10188c19fd59da7d73494de089c1b0a69ee22dcb847001c5317846a876bee1685d11c4db0673ec4c3a12008bb719650525b3c39e2b0469edda93830b3f1bde3e5b0b4637197866bb08c5858cf0d9876e3c7cad54169887bf9c80f9f4be362e1bc8c27f3434e9a918bac355c184bd899b9aebe6be20e70c0c69234342eb8b57aa9ffb7797a32df91cec2bbc90201658ca2297bf1fe68e65363867e1f6ad79b827f363d64fbd3b188d95307d011c4ce5bf4407908c058eeb97ec98dd0ebfdab6b348fa387f2a7573cac25344c983e8fd526c30ee6d59fe99a30c7d7e2864aa22bfa49df5f32da68309cab3ed9c2ce69b6ecb8508ce28a43ebd6c809b8afd07a4606e664965d316f3707a3abee9bcdc32a78031b0171fb565d90c16cd56e5792c0cf618b799715f32538e38f493d4e19ec76fc8a07576a13975706bfc2bb1516c2d18a4385cc37a206eac6c9fb8d073572ba2671d2198abf24fdd0c40d079ae44962c26743b4bf5950ac5ee34c5d7bd60b364ce670958112c37b9829bed7e1327356d6b94af3ba020c2337b2dba37d00af8a128a614390cdde62ce871f948427fb5c187df9a1540a5cc71da1a86144acbfd94bf433f744f0c4f2a675eba3ed251c5b11b08dfefc726c0394a9b75121d88467ed4b2cd69819dfe50693a4a4c8370d3af12f41c0067283bbb5a90044a340fc357a11081a6c13bb9c32d9caa448479fd5f0302b6729ca7233094540b14546d6bcc15771c2686279b34f9c0914f5306d0fabd5979266ea01a17a22507e560dbf904dd62c40e2bccb468710ee4c1caf4e786", 0xcfa}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000008540)={0x0, 0x0, 0x0}, 0x0) 18:46:22 executing program 5: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) mkdirat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x1ff) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) openat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\xeb', 0x1ff) socket$kcm(0x29, 0x0, 0x0) 18:46:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6}]}}, &(0x7f0000001240)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 18:46:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x3, &(0x7f0000519fa8), &(0x7f0000c43000)='syzkaller\x00', 0x0, 0x1000, &(0x7f00001f7000)=""/4096, 0x0, 0x0, [0xffffffc0, 0x2]}, 0x48) [ 488.828712][T21093] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. 18:46:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) close(r1) socket$kcm(0x10, 0x40000000003, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000240)={'bridge_slave_1\x00', @random="01003a1e2410"}) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x6, 0x1, 0x9, 0x7, 0x0, 0x0, 0xc0028, 0x1, 0x3, 0x9, 0x0, 0x401, 0x9, 0x200, 0x0, 0x9, 0x6a, 0x0, 0x7, 0x0, 0x0, 0x5, 0x1, 0x1, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x298, 0xe8a, 0x7, 0x0, 0x20000000000000, 0xffff, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x9, 0xf, 0x0, 0x0, 0x100000001}, 0x0, 0xe, r0, 0x0) 18:46:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6}]}}, &(0x7f0000001240)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 18:46:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x3, &(0x7f0000519fa8), &(0x7f0000c43000)='syzkaller\x00', 0x0, 0x1000, &(0x7f00001f7000)=""/4096, 0x0, 0x0, [0xffffffc0, 0x2]}, 0x48) [ 488.953797][T21093] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. 18:46:22 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002600)}, {0x0}], 0x2}, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000008540)={0x0, 0x0, 0x0}, 0x0) [ 489.302013][T21117] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. [ 489.346087][T21118] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. 18:46:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0x1) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x6) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="000700000000000000ff010000a9bb000001"]) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc020660b, 0x20000001) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x6611, 0x0) 18:46:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) close(r1) socket$kcm(0x10, 0x40000000003, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000240)={'bridge_slave_1\x00', @random="01003a1e2410"}) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x6, 0x1, 0x9, 0x7, 0x0, 0x0, 0xc0028, 0x1, 0x3, 0x9, 0x0, 0x401, 0x9, 0x200, 0x0, 0x9, 0x6a, 0x0, 0x7, 0x0, 0x0, 0x5, 0x1, 0x1, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x298, 0xe8a, 0x7, 0x0, 0x20000000000000, 0xffff, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x9, 0xf, 0x0, 0x0, 0x100000001}, 0x0, 0xe, r0, 0x0) 18:46:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$SIOCSIFHWADDR(r0, 0x8933, &(0x7f00000016c0)={'veth0_to_bridge\x00', @random="f33215f49e14"}) 18:46:23 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) close(r1) socket$kcm(0x10, 0x40000000003, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000240)={'bridge_slave_1\x00', @random="01003a1e2410"}) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x6, 0x1, 0x9, 0x7, 0x0, 0x0, 0xc0028, 0x1, 0x3, 0x9, 0x0, 0x401, 0x9, 0x200, 0x0, 0x9, 0x6a, 0x0, 0x7, 0x0, 0x0, 0x5, 0x1, 0x1, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x298, 0xe8a, 0x7, 0x0, 0x20000000000000, 0xffff, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x9, 0xf, 0x0, 0x0, 0x100000001}, 0x0, 0xe, r0, 0x0) 18:46:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6}]}}, &(0x7f0000001240)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 18:46:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000480)="c1507c002300000000068900ac14140deb10c100005b6e765e95637e8921f6053b58289405bfee4716753db96b057e43901a8bdf6a000062c8d81ab8e54af069470c1569c47a150300", 0x49}], 0x1, 0x0, 0x0, 0x50}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r0, 0x0, 0x35, &(0x7f0000000000)='vboxnet1\\wlan0usersystem,/vmnet0++.)ppp0ppp0Z([eth0$\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r2, r0, 0x0, 0x1, &(0x7f0000000280)='\x00', r3}, 0x30) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) 18:46:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x3c000000, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:46:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$SIOCSIFHWADDR(r0, 0x8933, &(0x7f00000016c0)={'veth0_to_bridge\x00', @random="f33215f49e14"}) 18:46:23 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) close(r1) socket$kcm(0x10, 0x40000000003, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000240)={'bridge_slave_1\x00', @random="01003a1e2410"}) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x6, 0x1, 0x9, 0x7, 0x0, 0x0, 0xc0028, 0x1, 0x3, 0x9, 0x0, 0x401, 0x9, 0x200, 0x0, 0x9, 0x6a, 0x0, 0x7, 0x0, 0x0, 0x5, 0x1, 0x1, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x298, 0xe8a, 0x7, 0x0, 0x20000000000000, 0xffff, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x9, 0xf, 0x0, 0x0, 0x100000001}, 0x0, 0xe, r0, 0x0) 18:46:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) close(r1) socket$kcm(0x10, 0x40000000003, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000240)={'bridge_slave_1\x00', @random="01003a1e2410"}) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x6, 0x1, 0x9, 0x7, 0x0, 0x0, 0xc0028, 0x1, 0x3, 0x9, 0x0, 0x401, 0x9, 0x200, 0x0, 0x9, 0x6a, 0x0, 0x7, 0x0, 0x0, 0x5, 0x1, 0x1, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x298, 0xe8a, 0x7, 0x0, 0x20000000000000, 0xffff, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x9, 0xf, 0x0, 0x0, 0x100000001}, 0x0, 0xe, r0, 0x0) 18:46:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000480)="c1507c002300000000068900ac14140deb10c100005b6e765e95637e8921f6053b58289405bfee4716753db96b057e43901a8bdf6a000062c8d81ab8e54af069470c1569c47a150300", 0x49}], 0x1, 0x0, 0x0, 0x50}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r0, 0x0, 0x35, &(0x7f0000000000)='vboxnet1\\wlan0usersystem,/vmnet0++.)ppp0ppp0Z([eth0$\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r2, r0, 0x0, 0x1, &(0x7f0000000280)='\x00', r3}, 0x30) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) 18:46:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$SIOCSIFHWADDR(r0, 0x8933, &(0x7f00000016c0)={'veth0_to_bridge\x00', @random="f33215f49e14"}) 18:46:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) perf_event_open(0x0, 0x0, 0x8, r0, 0x1) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x6) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="000700000000000000ff010000a9bb000001"]) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc020660b, 0x20000001) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x6611, 0x0) 18:46:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x3c000000, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:46:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000480)="c1507c002300000000068900ac14140deb10c100005b6e765e95637e8921f6053b58289405bfee4716753db96b057e43901a8bdf6a000062c8d81ab8e54af069470c1569c47a150300", 0x49}], 0x1, 0x0, 0x0, 0x50}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r0, 0x0, 0x35, &(0x7f0000000000)='vboxnet1\\wlan0usersystem,/vmnet0++.)ppp0ppp0Z([eth0$\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r2, r0, 0x0, 0x1, &(0x7f0000000280)='\x00', r3}, 0x30) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) 18:46:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$SIOCSIFHWADDR(r0, 0x8933, &(0x7f00000016c0)={'veth0_to_bridge\x00', @random="f33215f49e14"}) 18:46:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x3c000000, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:46:23 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) close(r1) socket$kcm(0x10, 0x40000000003, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000240)={'bridge_slave_1\x00', @random="01003a1e2410"}) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x6, 0x1, 0x9, 0x7, 0x0, 0x0, 0xc0028, 0x1, 0x3, 0x9, 0x0, 0x401, 0x9, 0x200, 0x0, 0x9, 0x6a, 0x0, 0x7, 0x0, 0x0, 0x5, 0x1, 0x1, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x298, 0xe8a, 0x7, 0x0, 0x20000000000000, 0xffff, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x9, 0xf, 0x0, 0x0, 0x100000001}, 0x0, 0xe, r0, 0x0) 18:46:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) close(r1) socket$kcm(0x10, 0x40000000003, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000240)={'bridge_slave_1\x00', @random="01003a1e2410"}) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x6, 0x1, 0x9, 0x7, 0x0, 0x0, 0xc0028, 0x1, 0x3, 0x9, 0x0, 0x401, 0x9, 0x200, 0x0, 0x9, 0x6a, 0x0, 0x7, 0x0, 0x0, 0x5, 0x1, 0x1, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x298, 0xe8a, 0x7, 0x0, 0x20000000000000, 0xffff, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x9, 0xf, 0x0, 0x0, 0x100000001}, 0x0, 0xe, r0, 0x0) 18:46:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000480)="c1507c002300000000068900ac14140deb10c100005b6e765e95637e8921f6053b58289405bfee4716753db96b057e43901a8bdf6a000062c8d81ab8e54af069470c1569c47a150300", 0x49}], 0x1, 0x0, 0x0, 0x50}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r0, 0x0, 0x35, &(0x7f0000000000)='vboxnet1\\wlan0usersystem,/vmnet0++.)ppp0ppp0Z([eth0$\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r2, r0, 0x0, 0x1, &(0x7f0000000280)='\x00', r3}, 0x30) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) 18:46:24 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00'}) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000001b00)={&(0x7f0000000500)=@tipc=@id, 0x80, 0x0, 0x0, &(0x7f00000007c0)=[{0x10, 0x11f}], 0x10}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000080)='./file0\x00', r2}, 0x10) socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) 18:46:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x3c000000, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:46:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg(r0, 0x0, 0x810) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)=""/28, 0xfe80}], 0x1, &(0x7f0000000300)=""/199, 0xc7}, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) 18:46:24 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x80, 0x0}, 0x4008000) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000280)=@in, 0xf, 0x0}, 0x0) 18:46:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 18:46:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x10000000002, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="39000000140081ae0000dc676f97daf01e23578134662c300b2c000500018701546fabca1b4e7d06a6580e88370200c54c1960b89c40ebb373", 0x39}], 0x1}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) recvmsg(r0, &(0x7f0000004c80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000004c40)=""/16, 0x10}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) 18:46:24 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x80, 0x0}, 0x4008000) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000280)=@in, 0xf, 0x0}, 0x0) 18:46:24 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000004c0)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)) 18:46:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg(r0, 0x0, 0x810) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)=""/28, 0xfe80}], 0x1, &(0x7f0000000300)=""/199, 0xc7}, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) [ 491.220757][T21217] ================================================================== [ 491.228892][T21217] BUG: KASAN: slab-out-of-bounds in __lock_acquire+0x3ba2/0x5490 [ 491.236687][T21217] Read of size 8 at addr ffff88808659c0c0 by task syz-executor.2/21217 [ 491.244939][T21217] [ 491.247292][T21217] CPU: 1 PID: 21217 Comm: syz-executor.2 Not tainted 5.1.0+ #1 [ 491.254843][T21217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.264906][T21217] Call Trace: [ 491.268213][T21217] dump_stack+0x172/0x1f0 [ 491.272553][T21217] ? __lock_acquire+0x3ba2/0x5490 [ 491.277623][T21217] print_address_description.cold+0x7c/0x20d [ 491.283609][T21217] ? __lock_acquire+0x3ba2/0x5490 [ 491.288640][T21217] ? __lock_acquire+0x3ba2/0x5490 [ 491.293671][T21217] __kasan_report.cold+0x1b/0x40 [ 491.298615][T21217] ? __lock_acquire+0x3ba2/0x5490 [ 491.303636][T21217] kasan_report+0x12/0x20 [ 491.303650][T21217] __asan_report_load8_noabort+0x14/0x20 [ 491.303662][T21217] __lock_acquire+0x3ba2/0x5490 [ 491.303767][T21217] ? sock_diag_rcv+0x2b/0x40 [ 491.303788][T21217] ? netlink_unicast+0x531/0x710 [ 491.328162][T21217] ? netlink_sendmsg+0x8ae/0xd70 [ 491.333105][T21217] ? sock_sendmsg+0xd7/0x130 [ 491.333126][T21217] ? ___sys_sendmsg+0x803/0x920 [ 491.342567][T21217] ? __sys_sendmsg+0x105/0x1d0 [ 491.342577][T21217] ? __x64_sys_sendmsg+0x78/0xb0 [ 491.342590][T21217] ? do_syscall_64+0xfd/0x680 [ 491.342606][T21217] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.342628][T21217] ? mark_held_locks+0xf0/0xf0 [ 491.368648][T21217] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 491.374297][T21217] ? find_held_lock+0x35/0x130 [ 491.379067][T21217] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 491.384712][T21217] lock_acquire+0x16f/0x3f0 [ 491.389397][T21217] ? rhashtable_walk_enter+0xf9/0x390 [ 491.394790][T21217] _raw_spin_lock+0x2f/0x40 [ 491.399307][T21217] ? rhashtable_walk_enter+0xf9/0x390 [ 491.404683][T21217] rhashtable_walk_enter+0xf9/0x390 [ 491.409957][T21217] __tipc_dump_start+0x1fa/0x3c0 [ 491.414905][T21217] tipc_dump_start+0x70/0x90 [ 491.419495][T21217] __netlink_dump_start+0x4f8/0x7d0 [ 491.424698][T21217] ? __tipc_dump_start+0x3c0/0x3c0 [ 491.429876][T21217] tipc_sock_diag_handler_dump+0x1d9/0x270 [ 491.435690][T21217] ? __tipc_diag_gen_cookie+0x90/0x90 [ 491.441065][T21217] ? sock_diag_rcv+0x1c/0x40 [ 491.445658][T21217] ? __tipc_dump_start+0x3c0/0x3c0 [ 491.450769][T21217] ? tipc_unregister_sysctl+0x20/0x20 [ 491.456147][T21217] ? tipc_ioctl+0x2e0/0x2e0 [ 491.460658][T21217] sock_diag_rcv_msg+0x319/0x410 [ 491.465599][T21217] netlink_rcv_skb+0x177/0x450 [ 491.470369][T21217] ? sock_diag_bind+0x80/0x80 [ 491.475057][T21217] ? netlink_ack+0xb50/0xb50 [ 491.479645][T21217] ? kasan_check_read+0x11/0x20 [ 491.479665][T21217] ? netlink_deliver_tap+0x254/0xbf0 [ 491.489791][T21217] sock_diag_rcv+0x2b/0x40 [ 491.494214][T21217] netlink_unicast+0x531/0x710 [ 491.498989][T21217] ? netlink_attachskb+0x770/0x770 [ 491.504110][T21217] ? _copy_from_iter_full+0x25d/0x8c0 [ 491.509491][T21217] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 491.515218][T21217] ? __check_object_size+0x3d/0x42f 18:46:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg(r0, 0x0, 0x810) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)=""/28, 0xfe80}], 0x1, &(0x7f0000000300)=""/199, 0xc7}, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) 18:46:25 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000004c0)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)) 18:46:25 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x80, 0x0}, 0x4008000) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000280)=@in, 0xf, 0x0}, 0x0) [ 491.520428][T21217] netlink_sendmsg+0x8ae/0xd70 [ 491.525241][T21217] ? netlink_unicast+0x710/0x710 [ 491.530195][T21217] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 491.535758][T21217] ? apparmor_socket_sendmsg+0x2a/0x30 [ 491.541236][T21217] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.547501][T21217] ? security_socket_sendmsg+0x8d/0xc0 [ 491.553095][T21217] ? netlink_unicast+0x710/0x710 [ 491.558047][T21217] sock_sendmsg+0xd7/0x130 [ 491.562478][T21217] ___sys_sendmsg+0x803/0x920 18:46:25 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000004c0)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)) [ 491.567170][T21217] ? copy_msghdr_from_user+0x430/0x430 [ 491.572637][T21217] ? kasan_check_read+0x11/0x20 [ 491.577494][T21217] ? __fget+0x381/0x550 [ 491.581659][T21217] ? ksys_dup3+0x3e0/0x3e0 [ 491.586085][T21217] ? lock_downgrade+0x880/0x880 [ 491.590943][T21217] ? __fget_light+0x1a9/0x230 [ 491.595651][T21217] ? __fdget+0x1b/0x20 [ 491.599726][T21217] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 491.605970][T21217] __sys_sendmsg+0x105/0x1d0 [ 491.610563][T21217] ? __ia32_sys_shutdown+0x80/0x80 [ 491.615684][T21217] ? trace_hardirqs_on_thunk+0x1a/0x1c 18:46:25 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000004c0)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)) [ 491.621154][T21217] ? do_syscall_64+0x26/0x680 [ 491.625837][T21217] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.631912][T21217] ? do_syscall_64+0x26/0x680 [ 491.636596][T21217] __x64_sys_sendmsg+0x78/0xb0 [ 491.641372][T21217] do_syscall_64+0xfd/0x680 [ 491.646010][T21217] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.651930][T21217] RIP: 0033:0x459279 18:46:25 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x80, 0x0}, 0x4008000) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000280)=@in, 0xf, 0x0}, 0x0) [ 491.655826][T21217] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.675456][T21217] RSP: 002b:00007fcd1a7aec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 491.683878][T21217] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 491.691940][T21217] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 491.699920][T21217] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 491.707902][T21217] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd1a7af6d4 [ 491.715884][T21217] R13: 00000000004c6c94 R14: 00000000004dba90 R15: 00000000ffffffff [ 491.723860][T21217] [ 491.723869][T21217] Allocated by task 20687: [ 491.723885][T21217] save_stack+0x23/0x90 [ 491.723897][T21217] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 491.723907][T21217] kasan_kmalloc+0x9/0x10 [ 491.723928][T21217] __kmalloc+0x15c/0x740 [ 491.740431][T21217] tomoyo_realpath_from_path+0xcd/0x7a0 [ 491.740446][T21217] tomoyo_path_number_perm+0x1dd/0x520 [ 491.740458][T21217] tomoyo_file_ioctl+0x23/0x30 [ 491.740471][T21217] security_file_ioctl+0x77/0xc0 [ 491.740484][T21217] ksys_ioctl+0x57/0xd0 [ 491.740497][T21217] __x64_sys_ioctl+0x73/0xb0 [ 491.740509][T21217] do_syscall_64+0xfd/0x680 [ 491.740525][T21217] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.740537][T21217] [ 491.791138][T21217] Freed by task 20687: [ 491.795233][T21217] save_stack+0x23/0x90 [ 491.799431][T21217] __kasan_slab_free+0x102/0x150 [ 491.804382][T21217] kasan_slab_free+0xe/0x10 [ 491.808908][T21217] kfree+0xcf/0x220 [ 491.812726][T21217] tomoyo_realpath_from_path+0x1de/0x7a0 18:46:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg(r0, 0x0, 0x810) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)=""/28, 0xfe80}], 0x1, &(0x7f0000000300)=""/199, 0xc7}, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) [ 491.818383][T21217] tomoyo_path_number_perm+0x1dd/0x520 [ 491.823859][T21217] tomoyo_file_ioctl+0x23/0x30 [ 491.828634][T21217] security_file_ioctl+0x77/0xc0 [ 491.833583][T21217] ksys_ioctl+0x57/0xd0 [ 491.837744][T21217] __x64_sys_ioctl+0x73/0xb0 [ 491.842349][T21217] do_syscall_64+0xfd/0x680 [ 491.846864][T21217] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.852757][T21217] [ 491.855091][T21217] The buggy address belongs to the object at ffff88808659cbc0 [ 491.855091][T21217] which belongs to the cache kmalloc-4k of size 4096 [ 491.855111][T21217] The buggy address is located 2816 bytes to the left of [ 491.855111][T21217] 4096-byte region [ffff88808659cbc0, ffff88808659dbc0) [ 491.883034][T21217] The buggy address belongs to the page: [ 491.883049][T21217] page:ffffea0002196700 count:1 mapcount:0 mapping:ffff8880aa400dc0 index:0x0 compound_mapcount: 0 [ 491.883064][T21217] flags: 0x1fffc0000010200(slab|head) [ 491.883083][T21217] raw: 01fffc0000010200 ffffea000293e688 ffffea0002196788 ffff8880aa400dc0 [ 491.883104][T21217] raw: 0000000000000000 ffff88808659cbc0 0000000100000001 0000000000000000 [ 491.921932][T21217] page dumped because: kasan: bad access detected [ 491.928342][T21217] [ 491.930670][T21217] Memory state around the buggy address: [ 491.936310][T21217] ffff88808659bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 491.944377][T21217] ffff88808659c000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 491.952446][T21217] >ffff88808659c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 491.960499][T21217] ^ [ 491.966632][T21217] ffff88808659c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 491.974678][T21217] ffff88808659c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 491.982727][T21217] ================================================================== [ 491.990829][T21217] Disabling lock debugging due to kernel taint [ 491.999033][T21217] Kernel panic - not syncing: panic_on_warn set ... [ 492.005634][T21217] CPU: 1 PID: 21217 Comm: syz-executor.2 Tainted: G B 5.1.0+ #1 [ 492.014567][T21217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.024653][T21217] Call Trace: [ 492.027956][T21217] dump_stack+0x172/0x1f0 [ 492.029866][ T3878] kobject: 'loop1' (00000000a911874b): kobject_uevent_env [ 492.032305][T21217] panic+0x2cb/0x646 [ 492.032320][T21217] ? __warn_printk+0xf3/0xf3 [ 492.032342][T21217] ? lock_downgrade+0x880/0x880 [ 492.041973][ T3878] kobject: 'loop1' (00000000a911874b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 492.043335][T21217] ? __lock_acquire+0x3ba2/0x5490 [ 492.043351][T21217] ? trace_hardirqs_off+0x62/0x220 [ 492.043371][T21217] ? trace_hardirqs_off+0x59/0x220 [ 492.078174][T21217] ? __lock_acquire+0x3ba2/0x5490 [ 492.083232][T21217] end_report+0x47/0x4f [ 492.087398][T21217] ? __lock_acquire+0x3ba2/0x5490 [ 492.092421][T21217] __kasan_report.cold+0xe/0x40 [ 492.097287][T21217] ? __lock_acquire+0x3ba2/0x5490 [ 492.102317][T21217] kasan_report+0x12/0x20 [ 492.106662][T21217] __asan_report_load8_noabort+0x14/0x20 [ 492.112309][T21217] __lock_acquire+0x3ba2/0x5490 [ 492.117180][T21217] ? sock_diag_rcv+0x2b/0x40 [ 492.121765][T21217] ? netlink_unicast+0x531/0x710 [ 492.126725][T21217] ? netlink_sendmsg+0x8ae/0xd70 [ 492.131721][T21217] ? sock_sendmsg+0xd7/0x130 [ 492.136309][T21217] ? ___sys_sendmsg+0x803/0x920 [ 492.141154][T21217] ? __sys_sendmsg+0x105/0x1d0 [ 492.145910][T21217] ? __x64_sys_sendmsg+0x78/0xb0 [ 492.150861][T21217] ? do_syscall_64+0xfd/0x680 [ 492.155538][T21217] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.161599][T21217] ? mark_held_locks+0xf0/0xf0 [ 492.166358][T21217] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 492.172000][T21217] ? find_held_lock+0x35/0x130 [ 492.176758][T21217] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 492.182379][T21217] lock_acquire+0x16f/0x3f0 [ 492.186864][T21217] ? rhashtable_walk_enter+0xf9/0x390 [ 492.192247][T21217] _raw_spin_lock+0x2f/0x40 [ 492.196753][T21217] ? rhashtable_walk_enter+0xf9/0x390 [ 492.202127][T21217] rhashtable_walk_enter+0xf9/0x390 [ 492.207313][T21217] __tipc_dump_start+0x1fa/0x3c0 [ 492.212232][T21217] tipc_dump_start+0x70/0x90 [ 492.216804][T21217] __netlink_dump_start+0x4f8/0x7d0 [ 492.229332][T21217] ? __tipc_dump_start+0x3c0/0x3c0 [ 492.234560][T21217] tipc_sock_diag_handler_dump+0x1d9/0x270 [ 492.240377][T21217] ? __tipc_diag_gen_cookie+0x90/0x90 [ 492.245953][T21217] ? sock_diag_rcv+0x1c/0x40 [ 492.250530][T21217] ? __tipc_dump_start+0x3c0/0x3c0 [ 492.255656][T21217] ? tipc_unregister_sysctl+0x20/0x20 [ 492.261012][T21217] ? tipc_ioctl+0x2e0/0x2e0 [ 492.265530][T21217] sock_diag_rcv_msg+0x319/0x410 [ 492.270452][T21217] netlink_rcv_skb+0x177/0x450 [ 492.275213][T21217] ? sock_diag_bind+0x80/0x80 [ 492.279879][T21217] ? netlink_ack+0xb50/0xb50 [ 492.284454][T21217] ? kasan_check_read+0x11/0x20 [ 492.289295][T21217] ? netlink_deliver_tap+0x254/0xbf0 [ 492.294700][T21217] sock_diag_rcv+0x2b/0x40 [ 492.299099][T21217] netlink_unicast+0x531/0x710 [ 492.303850][T21217] ? netlink_attachskb+0x770/0x770 [ 492.308941][T21217] ? _copy_from_iter_full+0x25d/0x8c0 [ 492.314301][T21217] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 492.320014][T21217] ? __check_object_size+0x3d/0x42f [ 492.325217][T21217] netlink_sendmsg+0x8ae/0xd70 [ 492.329981][T21217] ? netlink_unicast+0x710/0x710 [ 492.334998][T21217] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 492.340542][T21217] ? apparmor_socket_sendmsg+0x2a/0x30 [ 492.345981][T21217] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 492.352210][T21217] ? security_socket_sendmsg+0x8d/0xc0 [ 492.357680][T21217] ? netlink_unicast+0x710/0x710 [ 492.362599][T21217] sock_sendmsg+0xd7/0x130 [ 492.366999][T21217] ___sys_sendmsg+0x803/0x920 [ 492.371662][T21217] ? copy_msghdr_from_user+0x430/0x430 [ 492.377103][T21217] ? kasan_check_read+0x11/0x20 [ 492.381934][T21217] ? __fget+0x381/0x550 [ 492.386071][T21217] ? ksys_dup3+0x3e0/0x3e0 [ 492.390470][T21217] ? lock_downgrade+0x880/0x880 [ 492.395308][T21217] ? __fget_light+0x1a9/0x230 [ 492.399986][T21217] ? __fdget+0x1b/0x20 [ 492.404038][T21217] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 492.410278][T21217] __sys_sendmsg+0x105/0x1d0 [ 492.414867][T21217] ? __ia32_sys_shutdown+0x80/0x80 [ 492.419964][T21217] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 492.425429][T21217] ? do_syscall_64+0x26/0x680 [ 492.430094][T21217] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.436155][T21217] ? do_syscall_64+0x26/0x680 [ 492.440815][T21217] __x64_sys_sendmsg+0x78/0xb0 [ 492.445571][T21217] do_syscall_64+0xfd/0x680 [ 492.450092][T21217] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.455964][T21217] RIP: 0033:0x459279 [ 492.459849][T21217] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 492.479448][T21217] RSP: 002b:00007fcd1a7aec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 492.487873][T21217] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 492.495828][T21217] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 492.503788][T21217] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 492.511751][T21217] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd1a7af6d4 [ 492.519749][T21217] R13: 00000000004c6c94 R14: 00000000004dba90 R15: 00000000ffffffff [ 492.528728][T21217] Kernel Offset: disabled [ 492.533503][T21217] Rebooting in 86400 seconds..