[ 56.771818][ T26] audit: type=1800 audit(1558498117.658:25): pid=8452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 56.818112][ T26] audit: type=1800 audit(1558498117.658:26): pid=8452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 56.853277][ T26] audit: type=1800 audit(1558498117.668:27): pid=8452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] startpar: service(s) returned failure: ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.102' (ECDSA) to the list of known hosts. 2019/05/22 04:08:46 fuzzer started 2019/05/22 04:08:49 dialing manager at 10.128.0.26:40235 2019/05/22 04:08:53 syscalls: 97 2019/05/22 04:08:53 code coverage: enabled 2019/05/22 04:08:53 comparison tracing: enabled 2019/05/22 04:08:53 extra coverage: extra coverage is not supported by the kernel 2019/05/22 04:08:53 setuid sandbox: enabled 2019/05/22 04:08:53 namespace sandbox: enabled 2019/05/22 04:08:53 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/22 04:08:53 fault injection: enabled 2019/05/22 04:08:53 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/22 04:08:53 net packet injection: enabled 2019/05/22 04:08:53 net device setup: enabled 04:09:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c00810ce00f80ecdb4cb9f207c804a00d00000088000afb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 04:09:51 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfffffdef) syzkaller login: [ 130.632782][ T8640] IPVS: ftp: loaded support on port[0] = 21 [ 130.820842][ T8640] chnl_net:caif_netlink_parms(): no params data found 04:09:51 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="2e00000010008101048f80ecdb4cb92e0a480e201e000000e8bd6efb1200f9ff0d000300130000ff050005001204", 0x2e}], 0x1}, 0x0) [ 130.874661][ T8640] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.883160][ T8640] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.892947][ T8640] device bridge_slave_0 entered promiscuous mode [ 130.904122][ T8640] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.923962][ T8640] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.937501][ T8640] device bridge_slave_1 entered promiscuous mode [ 130.962660][ T8643] IPVS: ftp: loaded support on port[0] = 21 [ 130.983325][ T8640] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 130.995999][ T8640] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 131.064814][ T8640] team0: Port device team_slave_0 added [ 131.093936][ T8640] team0: Port device team_slave_1 added 04:09:52 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="1b000000210081ae00060c00f20e00000200000000000001800100", 0x1b}], 0x1}, 0x0) [ 131.183571][ T8640] device hsr_slave_0 entered promiscuous mode [ 131.220526][ T8640] device hsr_slave_1 entered promiscuous mode [ 131.308892][ T8645] IPVS: ftp: loaded support on port[0] = 21 [ 131.373416][ T8640] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.381903][ T8640] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.389925][ T8640] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.397775][ T8640] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.409687][ T8648] IPVS: ftp: loaded support on port[0] = 21 04:09:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) gettid() bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) [ 131.508408][ T8643] chnl_net:caif_netlink_parms(): no params data found [ 131.681254][ T8650] IPVS: ftp: loaded support on port[0] = 21 04:09:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x5, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)={&(0x7f0000001340)='./file0\x00'}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001500), 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="04ec0000000000150004000030b4f39c8102a573cc875a7b88a2a90ed255"]) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x16, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) [ 131.771256][ T8640] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.778758][ T8643] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.788622][ T8643] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.804545][ T8643] device bridge_slave_0 entered promiscuous mode [ 131.855797][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.867566][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.891109][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.903387][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 131.923251][ T8643] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.932776][ T8643] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.942764][ T8643] device bridge_slave_1 entered promiscuous mode [ 131.966450][ T8643] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 131.976147][ T8645] chnl_net:caif_netlink_parms(): no params data found [ 131.999617][ T8648] chnl_net:caif_netlink_parms(): no params data found [ 132.012158][ T8643] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 132.035876][ T8640] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.062883][ T8655] IPVS: ftp: loaded support on port[0] = 21 [ 132.087535][ T8643] team0: Port device team_slave_0 added [ 132.109547][ T8648] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.117540][ T8648] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.126569][ T8648] device bridge_slave_0 entered promiscuous mode [ 132.134882][ T8648] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.142175][ T8648] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.151768][ T8648] device bridge_slave_1 entered promiscuous mode [ 132.164335][ T8643] team0: Port device team_slave_1 added [ 132.232248][ T8643] device hsr_slave_0 entered promiscuous mode [ 132.300663][ T8643] device hsr_slave_1 entered promiscuous mode [ 132.352640][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.362553][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.373699][ T3692] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.384934][ T3692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.418780][ T8645] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.428649][ T8645] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.438537][ T8645] device bridge_slave_0 entered promiscuous mode [ 132.449748][ T8645] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.457667][ T8645] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.467672][ T8645] device bridge_slave_1 entered promiscuous mode [ 132.480771][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.489907][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.502066][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.512131][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.522555][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 132.533470][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 132.543523][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.552845][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.570206][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 132.583174][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 132.596638][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.612237][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.624453][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.638392][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.653121][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.676190][ T8640] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 132.702227][ T8648] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 132.746408][ T8645] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 132.758942][ T8648] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 132.787047][ T8648] team0: Port device team_slave_0 added [ 132.796199][ T8648] team0: Port device team_slave_1 added [ 132.804562][ T8645] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 132.838541][ T8645] team0: Port device team_slave_0 added [ 132.846540][ T8650] chnl_net:caif_netlink_parms(): no params data found [ 132.879020][ T8645] team0: Port device team_slave_1 added [ 132.899769][ T8650] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.909823][ T8650] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.918115][ T8650] device bridge_slave_0 entered promiscuous mode [ 132.927116][ T8650] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.936823][ T8650] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.944950][ T8650] device bridge_slave_1 entered promiscuous mode [ 133.002972][ T8645] device hsr_slave_0 entered promiscuous mode [ 133.050654][ T8645] device hsr_slave_1 entered promiscuous mode [ 133.104912][ T8650] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 133.163275][ T8648] device hsr_slave_0 entered promiscuous mode [ 133.210622][ T8648] device hsr_slave_1 entered promiscuous mode [ 133.272338][ T8650] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 133.284159][ T8640] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 133.386750][ T8655] chnl_net:caif_netlink_parms(): no params data found [ 133.414841][ T8650] team0: Port device team_slave_0 added [ 133.439916][ T8650] team0: Port device team_slave_1 added [ 133.487487][ T8643] 8021q: adding VLAN 0 to HW filter on device bond0 [ 133.523876][ T8645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 133.542893][ T8655] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.550495][ T8655] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.561983][ T8655] device bridge_slave_0 entered promiscuous mode [ 133.569718][ T8655] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.577082][ T8655] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.607187][ T8655] device bridge_slave_1 entered promiscuous mode [ 133.637873][ T8645] 8021q: adding VLAN 0 to HW filter on device team0 [ 133.662475][ C0] hrtimer: interrupt took 45525 ns [ 133.671093][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 133.687072][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.700935][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.711768][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.720480][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.727745][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.772333][ T8650] device hsr_slave_0 entered promiscuous mode [ 133.810787][ T8650] device hsr_slave_1 entered promiscuous mode [ 133.863121][ T8667] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.0'. [ 133.879553][ T8643] 8021q: adding VLAN 0 to HW filter on device team0 [ 133.889400][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.900999][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 133.913201][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.927034][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 133.958111][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.982226][ T3294] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.998348][ T3294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.019574][ T8648] 8021q: adding VLAN 0 to HW filter on device bond0 [ 134.041406][ T8655] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 134.059967][ T8655] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 134.094331][ T8665] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x3b, 0x0, 0x0) [ 134.131327][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.145818][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.164213][ T3294] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.178875][ T3294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.184912][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.215265][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 04:09:55 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg(r0, &(0x7f0000003900)={&(0x7f0000000300)=@un=@abs, 0x80, &(0x7f00000038c0)=[{&(0x7f0000000000)="1661a574d1000010000044350807006acff8cb6cb94666f4cc5ee71797098024d855dc557fbf4f76e02f59412d55b7dcf2775c6b83233a38a33a8b09db331324b245f62d315df347f3cf6586dd316742922285d29793463e6a470ca760b81eb50d9ddd02989eeb1fa44284e485932bb40623864f2ed64d8a9b", 0x79}], 0x1}, 0x0) [ 134.225029][ T3294] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.233578][ T3294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.244736][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 134.255480][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 134.270420][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 134.283321][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 134.295149][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 134.296463][ T8673] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! [ 134.306104][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 04:09:55 executing program 0: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r4, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 134.326474][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 134.338113][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 134.349524][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 134.365190][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 134.405186][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.453026][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 134.466538][ T8675] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 134.494519][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 134.497342][ T8675] CPU: 0 PID: 8675 Comm: syz-executor.0 Not tainted 5.2.0-rc1+ #1 [ 134.517084][ T8675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.534631][ T8675] Call Trace: [ 134.538356][ T8675] dump_stack+0x172/0x1f0 [ 134.543645][ T8675] dump_header+0x10f/0xb6c [ 134.550245][ T8675] ? __sanitizer_cov_trace_pc+0x2b/0x50 [ 134.560295][ T8675] ? ___ratelimit+0x60/0x595 [ 134.565312][ T8675] ? do_raw_spin_unlock+0x57/0x270 [ 134.570872][ T8675] oom_kill_process.cold+0x10/0x15 [ 134.576698][ T8675] out_of_memory+0x79a/0x1280 [ 134.582639][ T8675] ? retint_kernel+0x2b/0x2b [ 134.591777][ T8675] ? oom_killer_disable+0x280/0x280 [ 134.601149][ T8675] mem_cgroup_out_of_memory+0x1ca/0x230 [ 134.607158][ T8675] ? memcg_event_wake+0x230/0x230 [ 134.613339][ T8675] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 134.620197][ T8675] ? cgroup_file_notify+0x140/0x1b0 [ 134.626452][ T8675] memory_max_write+0x169/0x300 [ 134.634032][ T8675] ? mem_cgroup_write+0x360/0x360 [ 134.648855][ T8675] ? lock_acquire+0x16f/0x3f0 [ 134.655348][ T8675] ? kernfs_fop_write+0x227/0x480 [ 134.661771][ T8675] cgroup_file_write+0x241/0x790 [ 134.667081][ T8675] ? mem_cgroup_write+0x360/0x360 [ 134.672667][ T8675] ? kill_css+0x380/0x380 [ 134.677684][ T8675] ? kill_css+0x380/0x380 [ 134.684998][ T8675] kernfs_fop_write+0x2b8/0x480 [ 134.692627][ T8675] __vfs_write+0x8a/0x110 [ 134.699846][ T8675] ? kernfs_fop_open+0xd80/0xd80 [ 134.705539][ T8675] vfs_write+0x20c/0x580 [ 134.709953][ T8675] ksys_write+0x14f/0x290 [ 134.714531][ T8675] ? __ia32_sys_read+0xb0/0xb0 [ 134.719643][ T8675] ? __x64_sys_write+0x11/0xb0 [ 134.725737][ T8675] __x64_sys_write+0x73/0xb0 [ 134.730337][ T8675] do_syscall_64+0xfd/0x680 [ 134.736789][ T8675] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 134.743766][ T8675] RIP: 0033:0x459279 [ 134.749189][ T8675] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 134.786109][ T8675] RSP: 002b:00007efe8d3a0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 134.794856][ T8675] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 134.804303][ T8675] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 134.812549][ T8675] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 134.821479][ T8675] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efe8d3a16d4 [ 134.831231][ T8675] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 134.848470][ T8675] memory: usage 2840kB, limit 0kB, failcnt 8 [ 134.859262][ T8675] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 134.877753][ T8645] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 134.880644][ T8675] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 134.896462][ T8645] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 134.897789][ T8675] Memory cgroup stats for /syz0: cache:0KB rss:2268KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2200KB inactive_file:0KB active_file:0KB unevictable:0KB [ 134.944781][ T8675] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8674,uid=0 [ 134.966273][ T8675] Memory cgroup out of memory: Killed process 8674 (syz-executor.0) total-vm:72708kB, anon-rss:2148kB, file-rss:34816kB, shmem-rss:0kB 04:09:55 executing program 0: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r4, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 134.996883][ T1042] oom_reaper: reaped process 8674 (syz-executor.0), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 134.998337][ T8655] team0: Port device team_slave_0 added [ 135.028125][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 135.039212][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 135.051616][ T8640] syz-executor.0 invoked oom-killer: gfp_mask=0x40cd0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 135.056829][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 135.064980][ T8640] CPU: 1 PID: 8640 Comm: syz-executor.0 Not tainted 5.2.0-rc1+ #1 [ 135.073547][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.080315][ T8640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.080321][ T8640] Call Trace: [ 135.080345][ T8640] dump_stack+0x172/0x1f0 [ 135.080365][ T8640] dump_header+0x10f/0xb6c [ 135.080380][ T8640] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 135.080393][ T8640] ? ___ratelimit+0x60/0x595 [ 135.080406][ T8640] ? do_raw_spin_unlock+0x57/0x270 [ 135.080424][ T8640] oom_kill_process.cold+0x10/0x15 [ 135.089503][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 135.098360][ T8640] out_of_memory+0x79a/0x1280 [ 135.098377][ T8640] ? lock_downgrade+0x880/0x880 [ 135.098390][ T8640] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 135.098408][ T8640] ? oom_killer_disable+0x280/0x280 [ 135.104449][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.106100][ T8640] ? find_held_lock+0x35/0x130 [ 135.111562][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 135.116375][ T8640] mem_cgroup_out_of_memory+0x1ca/0x230 [ 135.122000][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.126125][ T8640] ? memcg_event_wake+0x230/0x230 [ 135.132139][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 135.139015][ T8640] ? do_raw_spin_unlock+0x57/0x270 [ 135.144883][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.148795][ T8640] ? _raw_spin_unlock+0x2d/0x50 [ 135.156017][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 135.160209][ T8640] try_charge+0x102c/0x15c0 [ 135.160225][ T8640] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 135.160239][ T8640] ? should_fail+0x1de/0x852 [ 135.160265][ T8640] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 135.168734][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 135.172913][ T8640] ? rcu_read_lock_sched_held+0x110/0x130 [ 135.172928][ T8640] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 135.172951][ T8640] __memcg_kmem_charge_memcg+0x7c/0x130 [ 135.183687][ T8643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 135.186291][ T8640] ? memcg_kmem_put_cache+0xb0/0xb0 [ 135.207903][ T8645] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 135.210094][ T8640] ? cache_grow_begin+0x3d6/0x650 [ 135.223258][ T8640] ? lockdep_hardirqs_on+0x418/0x5d0 [ 135.223273][ T8640] ? trace_hardirqs_on+0x67/0x220 [ 135.223289][ T8640] cache_grow_begin+0x402/0x650 [ 135.223307][ T8640] ? __cpuset_node_allowed+0x136/0x540 [ 135.286716][ T8640] fallback_alloc+0x1fd/0x2d0 [ 135.305714][ T8640] ____cache_alloc_node+0x1be/0x1e0 [ 135.305739][ T8640] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 135.355994][ T8640] kmem_cache_alloc+0x1e8/0x6f0 [ 135.360879][ T8640] __d_alloc+0x2e/0x8c0 [ 135.365066][ T8640] d_alloc+0x4d/0x280 [ 135.369240][ T8640] d_alloc_parallel+0xf4/0x1bb0 [ 135.374196][ T8640] ? __lock_acquire+0x54f/0x5490 [ 135.374218][ T8640] ? __d_lookup_rcu+0x6b0/0x6b0 [ 135.374230][ T8640] ? mark_held_locks+0xf0/0xf0 [ 135.374244][ T8640] ? lockdep_init_map+0x1be/0x6d0 [ 135.374257][ T8640] ? lockdep_init_map+0x1be/0x6d0 [ 135.374277][ T8640] __lookup_slow+0x1ab/0x500 [ 135.403752][ T8640] ? vfs_unlink+0x560/0x560 [ 135.408743][ T8640] ? kasan_check_write+0x14/0x20 [ 135.416011][ T8640] lookup_slow+0x58/0x80 [ 135.420293][ T8640] path_mountpoint+0x5d2/0x1e60 [ 135.425170][ T8640] ? mark_held_locks+0xf0/0xf0 [ 135.429975][ T8640] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 135.436258][ T8640] ? path_openat+0x46d0/0x46d0 [ 135.441243][ T8640] ? find_held_lock+0x35/0x130 [ 135.446122][ T8640] ? cache_grow_end+0xa4/0x190 [ 135.450915][ T8640] filename_mountpoint+0x190/0x3c0 04:09:56 executing program 2: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r4, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 135.456053][ T8640] ? filename_parentat.isra.0+0x410/0x410 [ 135.461807][ T8640] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 135.468337][ T8640] ? __phys_addr_symbol+0x30/0x70 [ 135.473481][ T8640] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 135.479371][ T8640] ? __check_object_size+0x3d/0x42f [ 135.485622][ T8640] ? strncpy_from_user+0x2ac/0x380 [ 135.490736][ T8640] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 135.497053][ T8640] ? getname_flags+0x277/0x5b0 [ 135.501830][ T8640] user_path_mountpoint_at+0x3a/0x50 [ 135.507423][ T8640] ksys_umount+0x167/0xf00 [ 135.521719][ T8640] ? __ia32_sys_rmdir+0x40/0x40 [ 135.527032][ T8640] ? __detach_mounts+0x320/0x320 [ 135.531963][ T8640] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 135.538602][ T8640] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 135.544056][ T8640] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 135.549637][ T8640] ? do_syscall_64+0x26/0x680 [ 135.554401][ T8640] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 135.561223][ T8640] ? do_syscall_64+0x26/0x680 [ 135.566722][ T8640] ? lockdep_hardirqs_on+0x418/0x5d0 [ 135.572371][ T8640] __x64_sys_umount+0x54/0x80 [ 135.577132][ T8640] do_syscall_64+0xfd/0x680 [ 135.581628][ T8640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 135.589331][ T8640] RIP: 0033:0x45bca7 [ 135.594373][ T8640] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 135.624813][ T8640] RSP: 002b:00007ffcd358a5d8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 135.633596][ T8640] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045bca7 [ 135.642045][ T8640] RDX: 00000000004036a0 RSI: 0000000000000002 RDI: 00007ffcd358a680 [ 135.650956][ T8640] RBP: 000000000000000a R08: 0000000000000000 R09: 000000000000000e [ 135.659280][ T8640] R10: 000000000000000a R11: 0000000000000202 R12: 00007ffcd358b710 [ 135.667447][ T8640] R13: 0000555556386940 R14: 0000000000000000 R15: 00007ffcd358b710 [ 135.681144][ T8640] memory: usage 492kB, limit 0kB, failcnt 21 [ 135.684535][ T8655] team0: Port device team_slave_1 added [ 135.687340][ T8640] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 135.702067][ T8640] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 135.710213][ T8640] Memory cgroup stats for /syz0: cache:0KB rss:76KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:76KB inactive_file:0KB active_file:0KB unevictable:0KB [ 135.741322][ T8640] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8640,uid=0 [ 135.748674][ T8648] 8021q: adding VLAN 0 to HW filter on device team0 [ 135.768668][ T8640] Memory cgroup out of memory: Killed process 8640 (syz-executor.0) total-vm:72444kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB [ 135.811606][ T1042] oom_reaper: reaped process 8640 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 135.827644][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 135.845093][ T8686] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 135.868582][ T8686] CPU: 1 PID: 8686 Comm: syz-executor.2 Not tainted 5.2.0-rc1+ #1 [ 135.869945][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 135.877382][ T8686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.877387][ T8686] Call Trace: [ 135.877417][ T8686] dump_stack+0x172/0x1f0 [ 135.877444][ T8686] dump_header+0x10f/0xb6c [ 135.889441][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.903395][ T8686] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 135.903410][ T8686] ? ___ratelimit+0x60/0x595 [ 135.903424][ T8686] ? do_raw_spin_unlock+0x57/0x270 [ 135.903442][ T8686] oom_kill_process.cold+0x10/0x15 [ 135.903461][ T8686] out_of_memory+0x79a/0x1280 [ 135.909514][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.911287][ T8686] ? retint_kernel+0x2b/0x2b [ 135.911308][ T8686] ? oom_killer_disable+0x280/0x280 [ 135.911332][ T8686] mem_cgroup_out_of_memory+0x1ca/0x230 [ 135.911351][ T8686] ? memcg_event_wake+0x230/0x230 [ 135.916476][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.927942][ T8686] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 135.927959][ T8686] ? cgroup_file_notify+0x140/0x1b0 [ 135.927989][ T8686] memory_max_write+0x169/0x300 [ 135.935935][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 135.941002][ T8686] ? mem_cgroup_write+0x360/0x360 [ 135.941022][ T8686] ? cgroup_file_write+0x86/0x790 [ 135.941040][ T8686] cgroup_file_write+0x241/0x790 [ 135.948362][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 135.954577][ T8686] ? mem_cgroup_write+0x360/0x360 [ 135.954592][ T8686] ? kill_css+0x380/0x380 [ 135.954610][ T8686] ? kill_css+0x380/0x380 [ 135.954626][ T8686] kernfs_fop_write+0x2b8/0x480 [ 135.954649][ T8686] __vfs_write+0x8a/0x110 [ 135.964509][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.972317][ T8686] ? kernfs_fop_open+0xd80/0xd80 [ 135.972336][ T8686] vfs_write+0x20c/0x580 [ 135.972351][ T8686] ksys_write+0x14f/0x290 [ 135.972366][ T8686] ? __ia32_sys_read+0xb0/0xb0 [ 135.972387][ T8686] ? do_syscall_64+0x26/0x680 [ 135.977254][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.982416][ T8686] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 135.982428][ T8686] ? do_syscall_64+0x26/0x680 [ 135.982445][ T8686] __x64_sys_write+0x73/0xb0 [ 135.982463][ T8686] do_syscall_64+0xfd/0x680 [ 136.000788][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 136.009806][ T8686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 136.022204][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 136.029207][ T8686] RIP: 0033:0x459279 [ 136.036806][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 136.040957][ T8686] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 136.040966][ T8686] RSP: 002b:00007f36c3dc4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 136.040987][ T8686] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 136.040993][ T8686] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 136.041001][ T8686] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 136.041009][ T8686] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f36c3dc56d4 [ 136.041016][ T8686] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 136.054934][ T8686] memory: usage 2620kB, limit 0kB, failcnt 12 [ 136.054999][ T8686] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 136.055038][ T8686] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 136.055105][ T8686] Memory cgroup stats for /syz2: cache:0KB rss:2184KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2184KB inactive_file:0KB active_file:0KB unevictable:0KB [ 136.055592][ T8686] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=8684,uid=0 [ 136.056285][ T8686] Memory cgroup out of memory: Killed process 8684 (syz-executor.2) total-vm:72576kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 136.059514][ T1042] oom_reaper: reaped process 8684 (syz-executor.2), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 136.065866][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 04:09:57 executing program 2: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r4, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 136.418195][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 136.421902][ T8645] syz-executor.2 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=0, oom_score_adj=0 [ 136.427755][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 136.445708][ T8645] CPU: 1 PID: 8645 Comm: syz-executor.2 Not tainted 5.2.0-rc1+ #1 [ 136.449589][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 136.455208][ T8645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.455215][ T8645] Call Trace: [ 136.455240][ T8645] dump_stack+0x172/0x1f0 [ 136.455259][ T8645] dump_header+0x10f/0xb6c [ 136.455281][ T8645] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 136.463749][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 136.473736][ T8645] ? ___ratelimit+0x60/0x595 [ 136.473752][ T8645] ? do_raw_spin_unlock+0x57/0x270 [ 136.473772][ T8645] oom_kill_process.cold+0x10/0x15 [ 136.477707][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 136.481669][ T8645] out_of_memory+0x79a/0x1280 [ 136.481685][ T8645] ? lock_downgrade+0x880/0x880 [ 136.481698][ T8645] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 136.481715][ T8645] ? oom_killer_disable+0x280/0x280 [ 136.486954][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 136.492446][ T8645] ? find_held_lock+0x35/0x130 [ 136.492471][ T8645] mem_cgroup_out_of_memory+0x1ca/0x230 [ 136.492490][ T8645] ? memcg_event_wake+0x230/0x230 [ 136.513720][ T8643] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 136.515273][ T8645] ? do_raw_spin_unlock+0x57/0x270 [ 136.528233][ T8645] ? _raw_spin_unlock+0x2d/0x50 [ 136.540703][ T8645] try_charge+0x102c/0x15c0 [ 136.540720][ T8645] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 136.540737][ T8645] ? should_fail+0x1de/0x852 [ 136.553821][ T8645] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 136.553841][ T8645] ? rcu_read_lock_sched_held+0x110/0x130 [ 136.553859][ T8645] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 136.565041][ T8645] __memcg_kmem_charge_memcg+0x7c/0x130 [ 136.565055][ T8645] ? memcg_kmem_put_cache+0xb0/0xb0 [ 136.565076][ T8645] cache_grow_begin+0x402/0x650 [ 136.576820][ T8645] ? __cpuset_node_allowed+0x136/0x540 [ 136.586745][ T8645] fallback_alloc+0x1fd/0x2d0 [ 136.597461][ T8645] ____cache_alloc_node+0x1be/0x1e0 [ 136.609054][ T8645] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 136.622513][ T8645] kmem_cache_alloc+0x1e8/0x6f0 [ 136.622536][ T8645] ? stack_trace_save+0xac/0xe0 [ 136.635346][ T8645] __alloc_file+0x27/0x300 [ 136.635361][ T8645] alloc_empty_file+0x72/0x170 [ 136.635380][ T8645] path_openat+0xef/0x46d0 [ 136.647568][ T8645] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 136.647591][ T8645] ? __lock_acquire+0x54f/0x5490 [ 136.658401][ T8645] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 136.658419][ T8645] ? mark_held_locks+0xf0/0xf0 [ 136.669957][ T8645] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 136.681701][ T8645] ? cache_grow_end+0xa4/0x190 [ 136.681716][ T8645] ? __alloc_fd+0x44d/0x560 [ 136.681739][ T8645] do_filp_open+0x1a1/0x280 [ 136.691565][ T8645] ? may_open_dev+0x100/0x100 [ 136.691589][ T8645] ? lock_downgrade+0x880/0x880 [ 136.691607][ T8645] ? kasan_check_read+0x11/0x20 [ 136.705925][ T8645] ? do_raw_spin_unlock+0x57/0x270 [ 136.717412][ T8645] ? _raw_spin_unlock+0x2d/0x50 [ 136.728679][ T8645] ? __alloc_fd+0x44d/0x560 [ 136.739159][ T8645] do_sys_open+0x3fe/0x5d0 [ 136.748740][ T8645] ? filp_open+0x80/0x80 [ 136.759232][ T8645] ? __detach_mounts+0x320/0x320 [ 136.769200][ T8645] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 136.778281][ T8645] ? do_syscall_64+0x26/0x680 [ 136.788911][ T8645] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 136.788929][ T8645] ? do_syscall_64+0x26/0x680 [ 136.799663][ T8645] __x64_sys_open+0x7e/0xc0 [ 136.809196][ T8645] do_syscall_64+0xfd/0x680 [ 136.813812][ T8645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 136.815115][ T8648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 136.820046][ T8645] RIP: 0033:0x4571f0 [ 136.831867][ T8645] Code: 31 c0 e9 45 ff ff ff 0f 1f 00 80 3f 00 0f 84 f7 00 00 00 55 53 b9 02 00 00 00 be 00 08 09 00 89 c8 48 81 ec 98 00 00 00 0f 05 <48> 3d 00 f0 ff ff 48 89 c3 0f 87 e9 00 00 00 85 db 0f 88 2f 01 00 [ 136.843714][ T8648] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 136.852102][ T8645] RSP: 002b:00007ffedacf3810 EFLAGS: 00000202 ORIG_RAX: 0000000000000002 [ 136.852116][ T8645] RAX: ffffffffffffffda RBX: 00000000000210ff RCX: 00000000004571f0 [ 136.852123][ T8645] RDX: 000000000000000c RSI: 0000000000090800 RDI: 00007ffedacf49f0 [ 136.852130][ T8645] RBP: 0000000000000004 R08: 0000000000000001 R09: 0000555555c19940 [ 136.852137][ T8645] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffedacf49f0 [ 136.852152][ T8645] R13: 00007ffedacf49e0 R14: 0000000000000000 R15: 00007ffedacf49f0 [ 136.912936][ T8645] memory: usage 276kB, limit 0kB, failcnt 25 [ 136.945411][ T8645] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 136.954266][ T8645] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 136.963027][ T8645] Memory cgroup stats for /syz2: cache:0KB rss:68KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:68KB inactive_file:0KB active_file:0KB unevictable:0KB [ 136.984342][ T8645] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=8645,uid=0 [ 137.001244][ T8645] Memory cgroup out of memory: Killed process 8645 (syz-executor.2) total-vm:72444kB, anon-rss:92kB, file-rss:35776kB, shmem-rss:0kB [ 137.016913][ T1042] oom_reaper: reaped process 8645 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 137.140818][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 137.150003][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 137.192503][ T8655] device hsr_slave_0 entered promiscuous mode [ 137.230711][ T8655] device hsr_slave_1 entered promiscuous mode 04:09:58 executing program 0: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r4, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 137.654471][ T8650] 8021q: adding VLAN 0 to HW filter on device bond0 [ 137.936253][ T8650] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.050629][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.058834][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.089583][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.113904][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.122922][ T8656] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.130230][ T8656] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.144921][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.155070][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.164795][ T8656] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.172648][ T8656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.180902][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 138.262211][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 138.271469][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 138.280412][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 138.289037][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 138.298595][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 138.388115][ T8650] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 138.399687][ T8650] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 138.413601][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 138.423394][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 138.432391][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.441329][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.451079][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 138.460626][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.468936][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 04:09:59 executing program 1: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r4, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:09:59 executing program 2: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r4, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:09:59 executing program 3: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r4, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 138.578493][ T8655] 8021q: adding VLAN 0 to HW filter on device bond0 [ 138.738782][ T8705] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 138.772420][ T8705] CPU: 0 PID: 8705 Comm: syz-executor.3 Not tainted 5.2.0-rc1+ #1 [ 138.780375][ T8705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.791359][ T8705] Call Trace: [ 138.794678][ T8705] dump_stack+0x172/0x1f0 [ 138.799088][ T8705] dump_header+0x10f/0xb6c [ 138.803621][ T8705] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 138.809714][ T8705] ? ___ratelimit+0x60/0x595 [ 138.814684][ T8705] ? do_raw_spin_unlock+0x57/0x270 [ 138.820436][ T8705] oom_kill_process.cold+0x10/0x15 [ 138.825838][ T8705] out_of_memory+0x79a/0x1280 [ 138.830558][ T8705] ? __sched_text_start+0x8/0x8 [ 138.835453][ T8705] ? oom_killer_disable+0x280/0x280 [ 138.841929][ T8705] mem_cgroup_out_of_memory+0x1ca/0x230 [ 138.847672][ T8705] ? memcg_event_wake+0x230/0x230 [ 138.852918][ T8705] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 138.859015][ T8705] ? cgroup_file_notify+0x140/0x1b0 [ 138.864842][ T8705] memory_max_write+0x169/0x300 [ 138.869992][ T8705] ? mem_cgroup_write+0x360/0x360 [ 138.875393][ T8705] ? lock_acquire+0x16f/0x3f0 [ 138.880708][ T8705] ? kernfs_fop_write+0x227/0x480 [ 138.886025][ T8705] cgroup_file_write+0x241/0x790 [ 138.891344][ T8705] ? mem_cgroup_write+0x360/0x360 [ 138.896920][ T8705] ? kill_css+0x380/0x380 [ 138.901398][ T8705] ? kill_css+0x380/0x380 [ 138.905763][ T8705] kernfs_fop_write+0x2b8/0x480 [ 138.910667][ T8705] __vfs_write+0x8a/0x110 [ 138.915021][ T8705] ? kernfs_fop_open+0xd80/0xd80 [ 138.920966][ T8705] vfs_write+0x20c/0x580 [ 138.925231][ T8705] ksys_write+0x14f/0x290 [ 138.929677][ T8705] ? __ia32_sys_read+0xb0/0xb0 [ 138.934467][ T8705] ? do_syscall_64+0x26/0x680 [ 138.939176][ T8705] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 138.945249][ T8705] ? do_syscall_64+0x26/0x680 [ 138.949954][ T8705] __x64_sys_write+0x73/0xb0 [ 138.954593][ T8705] do_syscall_64+0xfd/0x680 [ 138.959207][ T8705] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 138.965727][ T8705] RIP: 0033:0x459279 [ 138.969999][ T8705] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 138.990125][ T8705] RSP: 002b:00007fe4d5403c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 138.998733][ T8705] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 139.006970][ T8705] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 139.015480][ T8705] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 139.023826][ T8705] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe4d54046d4 [ 139.032012][ T8705] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 139.065267][ T8705] memory: usage 2692kB, limit 0kB, failcnt 8 [ 139.073317][ T8705] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 139.081317][ T8705] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 139.094434][ T8705] Memory cgroup stats for /syz3: cache:0KB rss:2272KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2208KB inactive_file:0KB active_file:0KB unevictable:0KB [ 139.124498][ T8705] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8704,uid=0 [ 139.146400][ T8705] Memory cgroup out of memory: Killed process 8704 (syz-executor.3) total-vm:72708kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 139.171373][ T8708] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 139.180517][ T8650] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 139.198312][ T8708] CPU: 1 PID: 8708 Comm: syz-executor.1 Not tainted 5.2.0-rc1+ #1 [ 139.205612][ T8710] IPVS: ftp: loaded support on port[0] = 21 [ 139.206293][ T8708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.213506][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.223215][ T8708] Call Trace: [ 139.223241][ T8708] dump_stack+0x172/0x1f0 [ 139.223262][ T8708] dump_header+0x10f/0xb6c [ 139.223277][ T8708] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 139.223296][ T8708] ? ___ratelimit+0x60/0x595 [ 139.236030][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.238375][ T8708] ? do_raw_spin_unlock+0x57/0x270 [ 139.238400][ T8708] oom_kill_process.cold+0x10/0x15 [ 139.248963][ T8655] 8021q: adding VLAN 0 to HW filter on device team0 [ 139.253535][ T8708] out_of_memory+0x79a/0x1280 [ 139.253552][ T8708] ? retint_kernel+0x2b/0x2b [ 139.253567][ T8708] ? oom_killer_disable+0x280/0x280 [ 139.253591][ T8708] mem_cgroup_out_of_memory+0x1ca/0x230 [ 139.268431][ T8708] ? memcg_event_wake+0x230/0x230 [ 139.268453][ T8708] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 139.268474][ T8708] ? cgroup_file_notify+0x140/0x1b0 [ 139.268492][ T8708] memory_max_write+0x169/0x300 [ 139.283003][ T8708] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 139.283025][ T8708] ? mem_cgroup_write+0x360/0x360 [ 139.283045][ T8708] ? lock_acquire+0x16f/0x3f0 [ 139.296538][ T8708] ? kernfs_fop_write+0x227/0x480 [ 139.296559][ T8708] cgroup_file_write+0x241/0x790 [ 139.296576][ T8708] ? mem_cgroup_write+0x360/0x360 [ 139.296596][ T8708] ? kill_css+0x380/0x380 [ 139.310640][ T8708] ? kill_css+0x380/0x380 [ 139.310657][ T8708] kernfs_fop_write+0x2b8/0x480 [ 139.310691][ T8708] __vfs_write+0x8a/0x110 [ 139.325007][ T8708] ? kernfs_fop_open+0xd80/0xd80 [ 139.325024][ T8708] vfs_write+0x20c/0x580 [ 139.325041][ T8708] ksys_write+0x14f/0x290 [ 139.325058][ T8708] ? __ia32_sys_read+0xb0/0xb0 [ 139.339468][ T8708] ? do_syscall_64+0x26/0x680 [ 139.339482][ T8708] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 139.339499][ T8708] ? do_syscall_64+0x26/0x680 [ 139.350854][ T8708] __x64_sys_write+0x73/0xb0 [ 139.350871][ T8708] do_syscall_64+0xfd/0x680 [ 139.350895][ T8708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 139.360840][ T8708] RIP: 0033:0x459279 [ 139.360856][ T8708] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 139.360864][ T8708] RSP: 002b:00007f2b9509cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 139.360877][ T8708] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 139.360889][ T8708] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 139.371260][ T8708] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 139.371268][ T8708] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2b9509d6d4 [ 139.371276][ T8708] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 139.376316][ T8708] memory: usage 2672kB, limit 0kB, failcnt 12 [ 139.395721][ T8708] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 139.411376][ T8708] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 139.444622][ T8708] Memory cgroup stats for /syz1: cache:0KB rss:2148KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2148KB inactive_file:0KB active_file:0KB unevictable:0KB [ 139.484514][ T8708] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=8707,uid=0 [ 139.488524][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.498763][ T8708] Memory cgroup out of memory: Killed process 8707 (syz-executor.1) total-vm:72576kB, anon-rss:2188kB, file-rss:35788kB, shmem-rss:0kB [ 139.512225][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.550695][ T8648] syz-executor.3 invoked oom-killer: gfp_mask=0x40cd0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 139.603347][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.614286][ T8648] CPU: 1 PID: 8648 Comm: syz-executor.3 Not tainted 5.2.0-rc1+ #1 [ 139.614828][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.627585][ T8648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.627591][ T8648] Call Trace: [ 139.627612][ T8648] dump_stack+0x172/0x1f0 [ 139.627634][ T8648] dump_header+0x10f/0xb6c [ 139.627661][ T8648] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 139.679626][ T8648] ? ___ratelimit+0x60/0x595 [ 139.686496][ T8648] ? do_raw_spin_unlock+0x57/0x270 [ 139.692227][ T8648] oom_kill_process.cold+0x10/0x15 [ 139.697357][ T8648] out_of_memory+0x79a/0x1280 [ 139.700537][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.702044][ T8648] ? oom_killer_disable+0x280/0x280 [ 139.713147][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.715527][ T8648] ? find_held_lock+0x35/0x130 [ 139.724017][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.728351][ T8648] mem_cgroup_out_of_memory+0x1ca/0x230 [ 139.735935][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.741409][ T8648] ? memcg_event_wake+0x230/0x230 [ 139.741437][ T8648] ? do_raw_spin_unlock+0x57/0x270 [ 139.749073][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 139.753721][ T8648] ? _raw_spin_unlock+0x2d/0x50 [ 139.753739][ T8648] try_charge+0x102c/0x15c0 [ 139.753760][ T8648] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 139.767200][ T8648] ? should_fail+0x1de/0x852 [ 139.776614][ T8648] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 139.787520][ T8648] ? rcu_read_lock_sched_held+0x110/0x130 [ 139.799175][ T8648] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 139.804720][ T8648] __memcg_kmem_charge_memcg+0x7c/0x130 [ 139.804735][ T8648] ? memcg_kmem_put_cache+0xb0/0xb0 [ 139.804752][ T8648] ? cache_grow_begin+0x3d6/0x650 [ 139.815573][ T8648] ? lockdep_hardirqs_on+0x418/0x5d0 [ 139.825839][ T8648] ? trace_hardirqs_on+0x67/0x220 [ 139.830964][ T8648] cache_grow_begin+0x402/0x650 [ 139.830978][ T8648] ? __cpuset_node_allowed+0x136/0x540 [ 139.830995][ T8648] fallback_alloc+0x1fd/0x2d0 [ 139.841310][ T8648] ____cache_alloc_node+0x1be/0x1e0 [ 139.841324][ T8648] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 139.841340][ T8648] kmem_cache_alloc+0x1e8/0x6f0 [ 139.851883][ T8648] __d_alloc+0x2e/0x8c0 [ 139.851899][ T8648] d_alloc+0x4d/0x280 [ 139.851916][ T8648] d_alloc_parallel+0xf4/0x1bb0 [ 139.863955][ T8648] ? __lock_acquire+0x54f/0x5490 [ 139.863985][ T8648] ? __d_lookup_rcu+0x6b0/0x6b0 [ 139.872175][ T8648] ? mark_held_locks+0xf0/0xf0 [ 139.872192][ T8648] ? lockdep_init_map+0x1be/0x6d0 [ 139.872208][ T8648] ? lockdep_init_map+0x1be/0x6d0 [ 139.881990][ T8648] __lookup_slow+0x1ab/0x500 [ 139.882005][ T8648] ? vfs_unlink+0x560/0x560 [ 139.882044][ T8648] ? kasan_check_write+0x14/0x20 [ 139.891794][ T8648] lookup_slow+0x58/0x80 [ 139.891810][ T8648] path_mountpoint+0x5d2/0x1e60 [ 139.891824][ T8648] ? mark_held_locks+0xf0/0xf0 [ 139.891844][ T8648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 139.901882][ T8648] ? path_openat+0x46d0/0x46d0 [ 139.901901][ T8648] ? find_held_lock+0x35/0x130 [ 139.911307][ T8648] ? cache_grow_end+0xa4/0x190 [ 139.911336][ T8648] filename_mountpoint+0x190/0x3c0 [ 139.920583][ T8648] ? filename_parentat.isra.0+0x410/0x410 [ 139.920605][ T8648] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 139.920632][ T8648] ? __phys_addr_symbol+0x30/0x70 [ 139.930216][ T8648] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 139.930232][ T8648] ? __check_object_size+0x3d/0x42f [ 139.930255][ T8648] ? strncpy_from_user+0x2ac/0x380 [ 139.941307][ T8648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 139.941321][ T8648] ? getname_flags+0x277/0x5b0 [ 139.941339][ T8648] user_path_mountpoint_at+0x3a/0x50 [ 139.950833][ T8648] ksys_umount+0x167/0xf00 [ 139.950851][ T8648] ? __ia32_sys_rmdir+0x40/0x40 [ 139.950868][ T8648] ? __detach_mounts+0x320/0x320 [ 139.961940][ T8648] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 139.961957][ T8648] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 139.961974][ T8648] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 139.973329][ T8648] ? do_syscall_64+0x26/0x680 [ 139.973344][ T8648] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 139.973361][ T8648] ? do_syscall_64+0x26/0x680 [ 139.985835][ T8648] ? lockdep_hardirqs_on+0x418/0x5d0 [ 139.985853][ T8648] __x64_sys_umount+0x54/0x80 [ 139.985871][ T8648] do_syscall_64+0xfd/0x680 [ 139.997742][ T8648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 140.008040][ T8648] RIP: 0033:0x45bca7 [ 140.017669][ T8648] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 140.028891][ T8648] RSP: 002b:00007fff817eb778 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 140.040034][ T8648] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045bca7 [ 140.050858][ T8648] RDX: 00000000004036a0 RSI: 0000000000000002 RDI: 00007fff817eb820 [ 140.050866][ T8648] RBP: 0000000000000004 R08: 0000000000000000 R09: 000000000000000e [ 140.050874][ T8648] R10: 000000000000000a R11: 0000000000000202 R12: 00007fff817ec8b0 [ 140.050881][ T8648] R13: 00005555567a9940 R14: 0000000000000000 R15: 00007fff817ec8b0 [ 140.165314][ T8648] memory: usage 348kB, limit 0kB, failcnt 23 [ 140.190561][ T8648] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 140.204219][ T8648] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 140.224200][ T8648] Memory cgroup stats for /syz3: cache:0KB rss:76KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:76KB inactive_file:0KB active_file:0KB unevictable:0KB [ 140.300169][ T8648] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8648,uid=0 [ 140.320798][ T8648] Memory cgroup out of memory: Killed process 8648 (syz-executor.3) total-vm:72444kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB [ 140.348993][ T1042] oom_reaper: reaped process 8648 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 140.380246][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 140.414044][ T8716] IPVS: ftp: loaded support on port[0] = 21 [ 140.440226][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 140.465850][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 140.491363][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 140.502415][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 140.514282][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 140.909849][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 140.922591][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 140.947058][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 140.986655][ T8655] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 141.003468][ T8655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 141.019249][ T104] device bridge_slave_1 left promiscuous mode [ 141.046858][ T104] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.124677][ T104] device bridge_slave_0 left promiscuous mode [ 141.157495][ T104] bridge0: port 1(bridge_slave_0) entered disabled state 04:10:02 executing program 3: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r4, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 144.643510][ T104] device hsr_slave_1 left promiscuous mode [ 144.707217][ T104] device hsr_slave_0 left promiscuous mode [ 144.770053][ T104] team0 (unregistering): Port device team_slave_1 removed [ 144.796023][ T104] team0 (unregistering): Port device team_slave_0 removed [ 144.818634][ T104] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 144.896626][ T104] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 145.049427][ T104] bond0 (unregistering): Released all slaves [ 145.205588][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 145.221496][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 145.297356][ T8655] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 145.562739][ T8710] chnl_net:caif_netlink_parms(): no params data found [ 145.717909][ T8710] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.764636][ T8710] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.783708][ T8710] device bridge_slave_0 entered promiscuous mode [ 145.816909][ T8710] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.839974][ T8710] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.861250][ T8710] device bridge_slave_1 entered promiscuous mode [ 145.890521][ T8716] chnl_net:caif_netlink_parms(): no params data found 04:10:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x5, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)={&(0x7f0000001340)='./file0\x00'}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001500), 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="04ec0000000000150004000030b4f39c8102a573cc875a7b88a2a90ed255"]) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x16, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) 04:10:06 executing program 1: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r4, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:10:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) gettid() bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) 04:10:06 executing program 3: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r4, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 145.943260][ T8710] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 145.977840][ T8710] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 146.139301][ T8710] team0: Port device team_slave_0 added [ 146.176484][ T8710] team0: Port device team_slave_1 added [ 146.208760][ T8716] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.258694][ T8716] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.295323][ T8716] device bridge_slave_0 entered promiscuous mode 04:10:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x5, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)={&(0x7f0000001340)='./file0\x00'}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001500), 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="04ec0000000000150004000030b4f39c8102a573cc875a7b88a2a90ed255"]) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x16, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) [ 146.322322][ T8716] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.329587][ T8716] bridge0: port 2(bridge_slave_1) entered disabled state 04:10:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) gettid() bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) [ 146.381461][ T8716] device bridge_slave_1 entered promiscuous mode 04:10:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x5, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)={&(0x7f0000001340)='./file0\x00'}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001500), 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="04ec0000000000150004000030b4f39c8102a573cc875a7b88a2a90ed255"]) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x16, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) [ 146.626828][ T8716] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 146.724782][ T8710] device hsr_slave_0 entered promiscuous mode [ 146.800644][ T8710] device hsr_slave_1 entered promiscuous mode [ 146.854903][ T8716] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 146.992613][ T8716] team0: Port device team_slave_0 added [ 147.019951][ T8716] team0: Port device team_slave_1 added [ 147.085277][ T8710] 8021q: adding VLAN 0 to HW filter on device bond0 [ 147.134057][ T8716] device hsr_slave_0 entered promiscuous mode [ 147.200865][ T8716] device hsr_slave_1 entered promiscuous mode [ 147.269891][ T8710] 8021q: adding VLAN 0 to HW filter on device team0 [ 147.302505][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 147.338060][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.410427][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 147.431703][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 147.450404][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.457480][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.465361][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 147.475447][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.484275][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.491368][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.499570][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 147.508530][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 147.529745][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 147.539770][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 147.556342][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 147.599149][ T8710] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 147.617927][ T8710] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 147.640351][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 147.649417][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 147.667959][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 147.679881][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 147.695555][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.706690][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 147.722438][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 147.777196][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 147.811241][ T8710] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 147.833414][ T8716] 8021q: adding VLAN 0 to HW filter on device bond0 [ 147.860031][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 147.871118][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.912486][ T8716] 8021q: adding VLAN 0 to HW filter on device team0 [ 147.933601][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 147.959850][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 147.981924][ T8656] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.989797][ T8656] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.023743][ T8755] IPVS: ftp: loaded support on port[0] = 21 [ 148.031260][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 148.039525][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.077605][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.088204][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.095475][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.137551][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 148.190926][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 148.208174][ T8759] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 148.212965][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 148.235553][ T8759] CPU: 0 PID: 8759 Comm: syz-executor.0 Not tainted 5.2.0-rc1+ #1 [ 148.243367][ T8759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.256122][ T8759] Call Trace: [ 148.259425][ T8759] dump_stack+0x172/0x1f0 [ 148.263852][ T8759] dump_header+0x10f/0xb6c [ 148.268368][ T8759] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 148.274456][ T8759] ? ___ratelimit+0x60/0x595 [ 148.279206][ T8759] ? do_raw_spin_unlock+0x57/0x270 [ 148.284362][ T8759] oom_kill_process.cold+0x10/0x15 [ 148.290495][ T8759] out_of_memory+0x79a/0x1280 [ 148.295476][ T8759] ? __sched_text_start+0x8/0x8 [ 148.300325][ T8759] ? oom_killer_disable+0x280/0x280 [ 148.305711][ T8759] mem_cgroup_out_of_memory+0x1ca/0x230 [ 148.311375][ T8759] ? memcg_event_wake+0x230/0x230 [ 148.316398][ T8759] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 148.322437][ T8759] ? cgroup_file_notify+0x140/0x1b0 [ 148.328539][ T8759] memory_max_write+0x169/0x300 [ 148.333387][ T8759] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 148.339101][ T8759] ? mem_cgroup_write+0x360/0x360 [ 148.344602][ T8759] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 148.350076][ T8759] cgroup_file_write+0x241/0x790 [ 148.355077][ T8759] ? mem_cgroup_write+0x360/0x360 [ 148.360384][ T8759] ? kill_css+0x380/0x380 [ 148.365169][ T8759] ? kernfs_ops+0x9f/0x120 [ 148.369582][ T8759] ? kill_css+0x380/0x380 [ 148.373911][ T8759] kernfs_fop_write+0x2b8/0x480 [ 148.380518][ T8759] __vfs_write+0x8a/0x110 [ 148.384950][ T8759] ? kernfs_fop_open+0xd80/0xd80 [ 148.390175][ T8759] vfs_write+0x20c/0x580 [ 148.395468][ T8759] ksys_write+0x14f/0x290 [ 148.400083][ T8759] ? __ia32_sys_read+0xb0/0xb0 [ 148.405840][ T8759] __x64_sys_write+0x73/0xb0 [ 148.412638][ T8759] do_syscall_64+0xfd/0x680 [ 148.417136][ T8759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 148.423205][ T8759] RIP: 0033:0x459279 [ 148.427101][ T8759] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 148.448592][ T8759] RSP: 002b:00007f07686d0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 148.457168][ T8759] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 148.465227][ T8759] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 148.473402][ T8759] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 148.481641][ T8759] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f07686d16d4 [ 148.489870][ T8759] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 148.523357][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 148.532265][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 148.541205][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 148.558191][ T8716] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 148.573985][ T8716] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 148.580389][ T8759] memory: usage 2976kB, limit 0kB, failcnt 44 [ 148.595058][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 148.604419][ T8759] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 148.604776][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 148.623027][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 148.631678][ T8759] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 148.638801][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 148.650320][ T8759] Memory cgroup stats for /syz0: cache:0KB rss:2128KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2128KB inactive_file:0KB active_file:0KB unevictable:0KB [ 148.677590][ T8759] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8757,uid=0 [ 148.682985][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.698125][ T8759] Memory cgroup out of memory: Killed process 8757 (syz-executor.0) total-vm:72844kB, anon-rss:2192kB, file-rss:35776kB, shmem-rss:0kB [ 148.730030][ T1042] oom_reaper: reaped process 8757 (syz-executor.0), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 148.758526][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 148.783453][ T8716] 8021q: adding VLAN 0 to HW filter on device batadv0 04:10:09 executing program 0: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r4, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:10:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) gettid() bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) [ 148.989556][ T8755] chnl_net:caif_netlink_parms(): no params data found [ 148.999810][ T8710] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 149.031056][ T8710] CPU: 1 PID: 8710 Comm: syz-executor.0 Not tainted 5.2.0-rc1+ #1 [ 149.039080][ T8710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.049345][ T8710] Call Trace: [ 149.052761][ T8710] dump_stack+0x172/0x1f0 [ 149.057215][ T8710] dump_header+0x10f/0xb6c [ 149.057232][ T8710] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 149.057250][ T8710] ? ___ratelimit+0x60/0x595 [ 149.067450][ T8710] ? do_raw_spin_unlock+0x57/0x270 [ 149.067470][ T8710] oom_kill_process.cold+0x10/0x15 [ 149.067488][ T8710] out_of_memory+0x79a/0x1280 [ 149.077170][ T8710] ? lock_downgrade+0x880/0x880 [ 149.077184][ T8710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 149.077203][ T8710] ? oom_killer_disable+0x280/0x280 [ 149.086973][ T8710] ? find_held_lock+0x35/0x130 [ 149.086997][ T8710] mem_cgroup_out_of_memory+0x1ca/0x230 [ 149.087014][ T8710] ? memcg_event_wake+0x230/0x230 [ 149.098521][ T8710] ? do_raw_spin_unlock+0x57/0x270 [ 149.098540][ T8710] ? _raw_spin_unlock+0x2d/0x50 [ 149.098562][ T8710] try_charge+0x102c/0x15c0 [ 149.119368][ T8710] ? find_held_lock+0x35/0x130 [ 149.134007][ T8710] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 149.144887][ T8710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 149.144902][ T8710] ? kasan_check_read+0x11/0x20 [ 149.144920][ T8710] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 149.144936][ T8710] mem_cgroup_try_charge+0x24d/0x5e0 [ 149.144958][ T8710] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 149.167373][ T8710] wp_page_copy+0x416/0x1770 [ 149.167390][ T8710] ? do_wp_page+0x486/0x1500 [ 149.167408][ T8710] ? pmd_pfn+0x1d0/0x1d0 [ 149.177839][ T8710] ? lock_downgrade+0x880/0x880 [ 149.177857][ T8710] ? swp_swapcount+0x540/0x540 [ 149.177876][ T8710] ? do_raw_spin_unlock+0x57/0x270 [ 149.188258][ T8710] ? kasan_check_read+0x11/0x20 [ 149.188274][ T8710] ? do_raw_spin_unlock+0x57/0x270 [ 149.188293][ T8710] do_wp_page+0x48e/0x1500 [ 149.208206][ T8710] ? finish_mkwrite_fault+0x540/0x540 [ 149.208236][ T8710] __handle_mm_fault+0x22e3/0x3eb0 [ 149.217776][ T8710] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 149.228579][ T8710] ? find_held_lock+0x35/0x130 [ 149.228596][ T8710] ? handle_mm_fault+0x292/0xa90 [ 149.228619][ T8710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 149.244694][ T8710] ? kasan_check_read+0x11/0x20 [ 149.244716][ T8710] handle_mm_fault+0x3b7/0xa90 [ 149.244736][ T8710] __do_page_fault+0x5ef/0xda0 [ 149.265336][ T8710] do_page_fault+0x71/0x57d [ 149.265351][ T8710] ? page_fault+0x8/0x30 [ 149.265367][ T8710] page_fault+0x1e/0x30 [ 149.274703][ T8710] RIP: 0033:0x430356 [ 149.274718][ T8710] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 149.274730][ T8710] RSP: 002b:00007ffc80e9a390 EFLAGS: 00010206 [ 149.304026][ T8710] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 149.304034][ T8710] RDX: 0000555555ea7930 RSI: 0000555555eaf970 RDI: 0000000000000003 [ 149.304041][ T8710] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555555ea6940 [ 149.304048][ T8710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 149.304054][ T8710] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 149.324486][ T8710] memory: usage 600kB, limit 0kB, failcnt 54 [ 149.392248][ T8710] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 149.400652][ T8710] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 149.408035][ T8710] Memory cgroup stats for /syz0: cache:0KB rss:32KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:32KB inactive_file:0KB active_file:0KB unevictable:0KB [ 149.439580][ T8710] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8710,uid=0 [ 149.465187][ T8710] Memory cgroup out of memory: Killed process 8710 (syz-executor.0) total-vm:72448kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 149.494395][ T1042] oom_reaper: reaped process 8710 (syz-executor.0), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 149.510679][ T8771] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 149.535782][ T8771] CPU: 1 PID: 8771 Comm: syz-executor.2 Not tainted 5.2.0-rc1+ #1 [ 149.543828][ T8771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.553985][ T8771] Call Trace: [ 149.557280][ T8771] dump_stack+0x172/0x1f0 [ 149.561692][ T8771] dump_header+0x10f/0xb6c [ 149.566274][ T8771] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 149.572165][ T8771] ? ___ratelimit+0x60/0x595 [ 149.576923][ T8771] ? do_raw_spin_unlock+0x57/0x270 [ 149.582115][ T8771] oom_kill_process.cold+0x10/0x15 [ 149.587454][ T8771] out_of_memory+0x79a/0x1280 [ 149.592754][ T8771] ? oom_killer_disable+0x280/0x280 [ 149.597956][ T8771] mem_cgroup_out_of_memory+0x1ca/0x230 [ 149.603691][ T8771] ? memcg_event_wake+0x230/0x230 [ 149.608802][ T8771] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 149.614693][ T8771] ? cgroup_file_notify+0x140/0x1b0 [ 149.619890][ T8771] memory_max_write+0x169/0x300 [ 149.624827][ T8771] ? mem_cgroup_write+0x360/0x360 [ 149.629930][ T8771] ? lock_acquire+0x16f/0x3f0 [ 149.634623][ T8771] ? kernfs_fop_write+0x227/0x480 [ 149.639739][ T8771] cgroup_file_write+0x241/0x790 [ 149.644690][ T8771] ? mem_cgroup_write+0x360/0x360 [ 149.649789][ T8771] ? kill_css+0x380/0x380 [ 149.654201][ T8771] ? kill_css+0x380/0x380 [ 149.658626][ T8771] kernfs_fop_write+0x2b8/0x480 [ 149.663486][ T8771] __vfs_write+0x8a/0x110 [ 149.667817][ T8771] ? kernfs_fop_open+0xd80/0xd80 [ 149.672922][ T8771] vfs_write+0x20c/0x580 [ 149.677240][ T8771] ksys_write+0x14f/0x290 [ 149.681559][ T8771] ? __ia32_sys_read+0xb0/0xb0 [ 149.686330][ T8771] ? do_syscall_64+0x26/0x680 [ 149.691019][ T8771] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 149.697174][ T8771] ? do_syscall_64+0x26/0x680 [ 149.701846][ T8771] __x64_sys_write+0x73/0xb0 [ 149.706435][ T8771] do_syscall_64+0xfd/0x680 [ 149.710930][ T8771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 149.716907][ T8771] RIP: 0033:0x459279 [ 149.720793][ T8771] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 149.740833][ T8771] RSP: 002b:00007ff315058c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 149.749506][ T8771] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 149.757551][ T8771] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 149.765533][ T8771] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 149.773601][ T8771] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff3150596d4 [ 149.781666][ T8771] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 149.802196][ T8771] memory: usage 2732kB, limit 0kB, failcnt 36 [ 149.818588][ T8755] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.826996][ T8755] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.830545][ T8771] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 149.843093][ T8755] device bridge_slave_0 entered promiscuous mode [ 149.859465][ T8771] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 149.867811][ T8771] Memory cgroup stats for /syz2: cache:0KB rss:2120KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2120KB inactive_file:0KB active_file:0KB unevictable:0KB [ 149.898096][ T8771] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=8769,uid=0 [ 149.925947][ T8771] Memory cgroup out of memory: Killed process 8769 (syz-executor.2) total-vm:72712kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 149.950989][ T1042] oom_reaper: reaped process 8769 (syz-executor.2), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB 04:10:11 executing program 4: bpf$MAP_CREATE(0x8, &(0x7f0000000080), 0x3c) 04:10:11 executing program 5: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r4, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:10:11 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) write$cgroup_subtree(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB], 0x0) r2 = socket$kcm(0x2, 0x80000000005, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x28082, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='securitytrusted-\'em0ppp0\'-em1\x00') socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r3, &(0x7f00000003c0)}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000800)={r4, 0x0}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) [ 150.119110][ T8716] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 04:10:11 executing program 4: r0 = socket$kcm(0x2, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8903, &(0x7f0000000000)) [ 150.223119][ T8716] CPU: 1 PID: 8716 Comm: syz-executor.2 Not tainted 5.2.0-rc1+ #1 [ 150.244907][ T8716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.261426][ T8716] Call Trace: [ 150.266215][ T8716] dump_stack+0x172/0x1f0 [ 150.270572][ T8716] dump_header+0x10f/0xb6c [ 150.275011][ T8716] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 150.280920][ T8716] ? ___ratelimit+0x60/0x595 [ 150.285521][ T8716] ? do_raw_spin_unlock+0x57/0x270 [ 150.290662][ T8716] oom_kill_process.cold+0x10/0x15 [ 150.290687][ T8716] out_of_memory+0x79a/0x1280 [ 150.290703][ T8716] ? lock_downgrade+0x880/0x880 [ 150.290717][ T8716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 150.290730][ T8716] ? oom_killer_disable+0x280/0x280 [ 150.290745][ T8716] ? find_held_lock+0x35/0x130 [ 150.322777][ T8716] mem_cgroup_out_of_memory+0x1ca/0x230 [ 150.328598][ T8716] ? memcg_event_wake+0x230/0x230 [ 150.333642][ T8716] ? do_raw_spin_unlock+0x57/0x270 [ 150.338952][ T8716] ? _raw_spin_unlock+0x2d/0x50 [ 150.343916][ T8716] try_charge+0x102c/0x15c0 [ 150.348443][ T8716] ? find_held_lock+0x35/0x130 [ 150.353241][ T8716] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 150.359089][ T8716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 150.365368][ T8716] ? kasan_check_read+0x11/0x20 [ 150.370251][ T8716] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 150.375824][ T8716] mem_cgroup_try_charge+0x24d/0x5e0 [ 150.381205][ T8716] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 150.387116][ T8716] wp_page_copy+0x416/0x1770 [ 150.391823][ T8716] ? do_wp_page+0x486/0x1500 [ 150.397548][ T8716] ? pmd_pfn+0x1d0/0x1d0 [ 150.403231][ T8716] ? lock_downgrade+0x880/0x880 [ 150.409054][ T8716] ? swp_swapcount+0x540/0x540 [ 150.413902][ T8716] ? do_raw_spin_unlock+0x57/0x270 [ 150.420715][ T8716] ? kasan_check_read+0x11/0x20 [ 150.425597][ T8716] ? do_raw_spin_unlock+0x57/0x270 [ 150.430819][ T8716] do_wp_page+0x48e/0x1500 [ 150.435358][ T8716] ? finish_mkwrite_fault+0x540/0x540 [ 150.440999][ T8716] __handle_mm_fault+0x22e3/0x3eb0 [ 150.446580][ T8716] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 150.452124][ T8716] ? find_held_lock+0x35/0x130 [ 150.457181][ T8716] ? handle_mm_fault+0x292/0xa90 [ 150.462205][ T8716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 150.469322][ T8716] ? kasan_check_read+0x11/0x20 [ 150.475151][ T8716] handle_mm_fault+0x3b7/0xa90 [ 150.481919][ T8716] __do_page_fault+0x5ef/0xda0 [ 150.488580][ T8716] do_page_fault+0x71/0x57d [ 150.495853][ T8716] ? page_fault+0x8/0x30 [ 150.501161][ T8716] page_fault+0x1e/0x30 [ 150.505305][ T8716] RIP: 0033:0x430356 [ 150.509386][ T8716] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 150.530831][ T8716] RSP: 002b:00007ffcc1c483f0 EFLAGS: 00010206 [ 150.537129][ T8716] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 150.545282][ T8716] RDX: 0000555556525930 RSI: 000055555652d970 RDI: 0000000000000003 [ 150.554167][ T8716] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556524940 [ 150.562388][ T8716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 150.570506][ T8716] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 150.583219][ T8716] memory: usage 400kB, limit 0kB, failcnt 45 [ 150.589937][ T8716] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 150.598265][ T8716] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 150.605473][ T8716] Memory cgroup stats for /syz2: cache:0KB rss:16KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:16KB inactive_file:0KB active_file:0KB unevictable:0KB [ 150.626591][ T8716] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=8716,uid=0 [ 150.642671][ T8716] Memory cgroup out of memory: Killed process 8716 (syz-executor.2) total-vm:72448kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 150.643480][ T1042] oom_reaper: reaped process 8716 (syz-executor.2), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 150.680509][ T8774] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 150.699429][ T8774] CPU: 0 PID: 8774 Comm: syz-executor.5 Not tainted 5.2.0-rc1+ #1 [ 150.707294][ T8774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.707303][ T8774] Call Trace: [ 150.707333][ T8774] dump_stack+0x172/0x1f0 [ 150.707356][ T8774] dump_header+0x10f/0xb6c [ 150.707376][ T8774] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 150.707394][ T8774] ? ___ratelimit+0x60/0x595 [ 150.707408][ T8774] ? do_raw_spin_unlock+0x57/0x270 [ 150.707425][ T8774] oom_kill_process.cold+0x10/0x15 [ 150.707441][ T8774] out_of_memory+0x79a/0x1280 [ 150.707462][ T8774] ? oom_killer_disable+0x280/0x280 [ 150.721406][ T8774] mem_cgroup_out_of_memory+0x1ca/0x230 [ 150.721424][ T8774] ? memcg_event_wake+0x230/0x230 [ 150.721444][ T8774] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 150.721460][ T8774] ? cgroup_file_notify+0x140/0x1b0 [ 150.721482][ T8774] memory_max_write+0x169/0x300 [ 150.731448][ T8774] ? mem_cgroup_write+0x360/0x360 [ 150.731463][ T8774] ? lock_acquire+0x1ea/0x3f0 [ 150.731486][ T8774] cgroup_file_write+0x241/0x790 [ 150.731505][ T8774] ? mem_cgroup_write+0x360/0x360 [ 150.731518][ T8774] ? kill_css+0x380/0x380 [ 150.731541][ T8774] ? kill_css+0x380/0x380 [ 150.743831][ T8774] kernfs_fop_write+0x2b8/0x480 [ 150.743850][ T8774] __vfs_write+0x8a/0x110 [ 150.743863][ T8774] ? kernfs_fop_open+0xd80/0xd80 [ 150.743879][ T8774] vfs_write+0x20c/0x580 [ 150.743894][ T8774] ksys_write+0x14f/0x290 [ 150.743909][ T8774] ? __ia32_sys_read+0xb0/0xb0 [ 150.743930][ T8774] __x64_sys_write+0x73/0xb0 [ 150.755138][ T8774] ? do_syscall_64+0x5b/0x680 [ 150.755158][ T8774] do_syscall_64+0xfd/0x680 [ 150.755178][ T8774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 150.755191][ T8774] RIP: 0033:0x459279 [ 150.755205][ T8774] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 150.755215][ T8774] RSP: 002b:00007f5fc6aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 150.765392][ T8774] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 150.765400][ T8774] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 150.765408][ T8774] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 150.765416][ T8774] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5fc6af06d4 [ 150.765431][ T8774] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 150.790767][ T8774] memory: usage 2944kB, limit 0kB, failcnt 12 [ 150.800077][ T8774] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 150.817427][ T8774] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 150.831530][ T8774] Memory cgroup stats for /syz5: cache:0KB rss:2268KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2200KB inactive_file:0KB active_file:0KB unevictable:0KB [ 150.838238][ T8774] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=8773,uid=0 [ 150.855413][ T8774] Memory cgroup out of memory: Killed process 8773 (syz-executor.5) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 151.091132][ T8655] syz-executor.5 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=0, oom_score_adj=0 [ 151.104590][ T8655] CPU: 0 PID: 8655 Comm: syz-executor.5 Not tainted 5.2.0-rc1+ #1 [ 151.113466][ T8655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.124768][ T8655] Call Trace: [ 151.129549][ T8655] dump_stack+0x172/0x1f0 [ 151.133924][ T8655] dump_header+0x10f/0xb6c [ 151.138448][ T8655] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 151.144262][ T8655] ? ___ratelimit+0x60/0x595 [ 151.148869][ T8655] ? do_raw_spin_unlock+0x57/0x270 [ 151.154532][ T8655] oom_kill_process.cold+0x10/0x15 [ 151.159765][ T8655] out_of_memory+0x79a/0x1280 [ 151.164449][ T8655] ? lock_downgrade+0x880/0x880 [ 151.169395][ T8655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 151.175910][ T8655] ? oom_killer_disable+0x280/0x280 [ 151.181123][ T8655] ? find_held_lock+0x35/0x130 [ 151.186456][ T8655] mem_cgroup_out_of_memory+0x1ca/0x230 [ 151.192712][ T8655] ? memcg_event_wake+0x230/0x230 [ 151.197770][ T8655] ? do_raw_spin_unlock+0x57/0x270 [ 151.203346][ T8655] ? _raw_spin_unlock+0x2d/0x50 [ 151.208414][ T8655] try_charge+0x102c/0x15c0 [ 151.212936][ T8655] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 151.219461][ T8655] ? should_fail+0x1de/0x852 [ 151.224333][ T8655] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 151.230149][ T8655] ? rcu_read_lock_sched_held+0x110/0x130 [ 151.235882][ T8655] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 151.241630][ T8655] __memcg_kmem_charge_memcg+0x7c/0x130 [ 151.247277][ T8655] ? memcg_kmem_put_cache+0xb0/0xb0 [ 151.252582][ T8655] ? cache_grow_begin+0x3d6/0x650 [ 151.257905][ T8655] ? lockdep_hardirqs_on+0x418/0x5d0 [ 151.263203][ T8655] ? trace_hardirqs_on+0x67/0x220 [ 151.268350][ T8655] cache_grow_begin+0x402/0x650 [ 151.273298][ T8655] ? __cpuset_node_allowed+0x136/0x540 [ 151.279158][ T8655] fallback_alloc+0x1fd/0x2d0 [ 151.285790][ T8655] ____cache_alloc_node+0x1be/0x1e0 [ 151.290997][ T8655] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 151.297435][ T8655] kmem_cache_alloc+0x1e8/0x6f0 [ 151.303149][ T8655] ? stack_trace_save+0xac/0xe0 [ 151.308094][ T8655] __alloc_file+0x27/0x300 [ 151.312866][ T8655] alloc_empty_file+0x72/0x170 [ 151.318244][ T8655] path_openat+0xef/0x46d0 [ 151.322754][ T8655] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 151.330816][ T8655] ? __lock_acquire+0x54f/0x5490 [ 151.336050][ T8655] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 151.343104][ T8655] ? mark_held_locks+0xf0/0xf0 [ 151.348999][ T8655] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 151.354446][ T8655] ? cache_grow_end+0xa4/0x190 [ 151.359214][ T8655] ? __alloc_fd+0x44d/0x560 [ 151.363940][ T8655] do_filp_open+0x1a1/0x280 [ 151.368558][ T8655] ? may_open_dev+0x100/0x100 [ 151.373342][ T8655] ? lock_downgrade+0x880/0x880 [ 151.378213][ T8655] ? kasan_check_read+0x11/0x20 [ 151.383309][ T8655] ? do_raw_spin_unlock+0x57/0x270 [ 151.388405][ T8655] ? _raw_spin_unlock+0x2d/0x50 [ 151.393251][ T8655] ? __alloc_fd+0x44d/0x560 [ 151.398142][ T8655] do_sys_open+0x3fe/0x5d0 [ 151.402563][ T8655] ? filp_open+0x80/0x80 [ 151.406932][ T8655] ? __detach_mounts+0x320/0x320 [ 151.414007][ T8655] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 151.420189][ T8655] ? do_syscall_64+0x26/0x680 [ 151.426326][ T8655] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 151.432758][ T8655] ? do_syscall_64+0x26/0x680 [ 151.437878][ T8655] __x64_sys_open+0x7e/0xc0 [ 151.442809][ T8655] do_syscall_64+0xfd/0x680 [ 151.447768][ T8655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 151.454448][ T8655] RIP: 0033:0x4571f0 [ 151.459040][ T8655] Code: 31 c0 e9 45 ff ff ff 0f 1f 00 80 3f 00 0f 84 f7 00 00 00 55 53 b9 02 00 00 00 be 00 08 09 00 89 c8 48 81 ec 98 00 00 00 0f 05 <48> 3d 00 f0 ff ff 48 89 c3 0f 87 e9 00 00 00 85 db 0f 88 2f 01 00 [ 151.482300][ T8655] RSP: 002b:00007ffea381e6e0 EFLAGS: 00000202 ORIG_RAX: 0000000000000002 [ 151.490973][ T8655] RAX: ffffffffffffffda RBX: 0000000000024aac RCX: 00000000004571f0 [ 151.500648][ T8655] RDX: 000000000000000c RSI: 0000000000090800 RDI: 00007ffea381f8c0 [ 151.509301][ T8655] RBP: 000000000000000c R08: 0000000000000001 R09: 00005555572cc940 [ 151.518515][ T8655] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffea381f8c0 [ 151.527252][ T8655] R13: 00007ffea381f8b0 R14: 0000000000000000 R15: 00007ffea381f8c0 [ 151.540609][ T8655] memory: usage 588kB, limit 0kB, failcnt 25 [ 151.546828][ T8655] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 151.558259][ T8655] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 151.558267][ T8655] Memory cgroup stats for /syz5: cache:0KB rss:72KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:72KB inactive_file:0KB active_file:0KB unevictable:0KB [ 151.558340][ T8655] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=8655,uid=0 [ 151.558432][ T8655] Memory cgroup out of memory: Killed process 8655 (syz-executor.5) total-vm:72444kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB [ 151.587297][ T1042] oom_reaper: reaped process 8655 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 151.633604][ T8755] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.641028][ T8755] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.650963][ T8755] device bridge_slave_1 entered promiscuous mode [ 152.572846][ T8755] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 152.844717][ T8755] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 153.099782][ T8755] team0: Port device team_slave_0 added [ 153.107583][ T8755] team0: Port device team_slave_1 added [ 153.383236][ T8755] device hsr_slave_0 entered promiscuous mode [ 153.423329][ T8755] device hsr_slave_1 entered promiscuous mode [ 154.080589][ T8755] 8021q: adding VLAN 0 to HW filter on device bond0 [ 154.097814][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.111660][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.124534][ T8755] 8021q: adding VLAN 0 to HW filter on device team0 [ 154.321616][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.331501][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.341115][ T3294] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.349421][ T3294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.656575][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 154.674030][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 154.685233][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.694727][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.702222][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.714591][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 154.724029][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 154.733549][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 154.743283][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 154.760872][ T104] device bridge_slave_1 left promiscuous mode [ 154.767395][ T104] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.821895][ T104] device bridge_slave_0 left promiscuous mode [ 154.829011][ T104] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.882279][ T104] device bridge_slave_1 left promiscuous mode [ 154.899498][ T104] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.941221][ T104] device bridge_slave_0 left promiscuous mode [ 154.962289][ T104] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.563689][ T104] device hsr_slave_1 left promiscuous mode [ 161.606372][ T104] device hsr_slave_0 left promiscuous mode [ 161.662892][ T104] team0 (unregistering): Port device team_slave_1 removed [ 161.687725][ T104] team0 (unregistering): Port device team_slave_0 removed [ 161.716995][ T104] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 161.799697][ T104] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 161.916766][ T104] bond0 (unregistering): Released all slaves [ 162.074633][ T104] device hsr_slave_1 left promiscuous mode [ 162.135978][ T104] device hsr_slave_0 left promiscuous mode [ 162.215611][ T104] team0 (unregistering): Port device team_slave_1 removed [ 162.241492][ T104] team0 (unregistering): Port device team_slave_0 removed [ 162.257249][ T104] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 162.307500][ T104] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 162.477197][ T104] bond0 (unregistering): Released all slaves [ 162.600285][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.623137][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.642346][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.658653][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.679167][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.703901][ T8755] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 162.724607][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.738452][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.757021][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.813395][ T8755] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.088582][ T8787] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 163.101305][ T8787] CPU: 1 PID: 8787 Comm: syz-executor.3 Not tainted 5.2.0-rc1+ #1 [ 163.109919][ T8787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.124814][ T8787] Call Trace: [ 163.128882][ T8787] dump_stack+0x172/0x1f0 [ 163.133922][ T8787] dump_header+0x10f/0xb6c [ 163.138435][ T8787] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 163.144341][ T8787] ? ___ratelimit+0x60/0x595 [ 163.149102][ T8787] ? do_raw_spin_unlock+0x57/0x270 [ 163.154305][ T8787] oom_kill_process.cold+0x10/0x15 [ 163.159704][ T8787] out_of_memory+0x79a/0x1280 [ 163.164570][ T8787] ? __sched_text_start+0x8/0x8 [ 163.169515][ T8787] ? oom_killer_disable+0x280/0x280 [ 163.174928][ T8787] mem_cgroup_out_of_memory+0x1ca/0x230 [ 163.180486][ T8787] ? memcg_event_wake+0x230/0x230 [ 163.185877][ T8787] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 163.192565][ T8787] ? cgroup_file_notify+0x140/0x1b0 [ 163.199691][ T8787] memory_max_write+0x169/0x300 [ 163.204568][ T8787] ? mem_cgroup_write+0x360/0x360 [ 163.210382][ T8787] ? lock_acquire+0x1ea/0x3f0 [ 163.215446][ T8787] cgroup_file_write+0x241/0x790 [ 163.220391][ T8787] ? mem_cgroup_write+0x360/0x360 [ 163.226834][ T8787] ? kill_css+0x380/0x380 [ 163.231351][ T8787] ? kill_css+0x380/0x380 [ 163.235770][ T8787] kernfs_fop_write+0x2b8/0x480 [ 163.240657][ T8787] __vfs_write+0x8a/0x110 [ 163.245692][ T8787] ? kernfs_fop_open+0xd80/0xd80 [ 163.250720][ T8787] vfs_write+0x20c/0x580 [ 163.255577][ T8787] ksys_write+0x14f/0x290 [ 163.260077][ T8787] ? __ia32_sys_read+0xb0/0xb0 [ 163.265419][ T8787] __x64_sys_write+0x73/0xb0 [ 163.270238][ T8787] do_syscall_64+0xfd/0x680 [ 163.274954][ T8787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 163.281191][ T8787] RIP: 0033:0x459279 [ 163.285099][ T8787] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 163.305400][ T8787] RSP: 002b:00007f4ebc779c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 163.314090][ T8787] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 163.322153][ T8787] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 163.330210][ T8787] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 163.338216][ T8787] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ebc77a6d4 [ 163.347232][ T8787] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 163.371822][ T8787] memory: usage 2824kB, limit 0kB, failcnt 46 [ 163.387997][ T8787] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 163.397188][ T8787] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 163.412882][ T8787] Memory cgroup stats for /syz3: cache:0KB rss:2176KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2176KB inactive_file:0KB active_file:0KB unevictable:0KB [ 163.445781][ T8787] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8786,uid=0 [ 163.468774][ T8787] Memory cgroup out of memory: Killed process 8786 (syz-executor.3) total-vm:72844kB, anon-rss:2192kB, file-rss:35776kB, shmem-rss:0kB [ 163.493195][ T1042] oom_reaper: reaped process 8786 (syz-executor.3), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 163.725971][ T8755] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 163.741754][ T8755] CPU: 1 PID: 8755 Comm: syz-executor.3 Not tainted 5.2.0-rc1+ #1 [ 163.749629][ T8755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.760245][ T8755] Call Trace: [ 163.763544][ T8755] dump_stack+0x172/0x1f0 [ 163.767892][ T8755] dump_header+0x10f/0xb6c [ 163.772415][ T8755] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 163.778873][ T8755] ? ___ratelimit+0x60/0x595 [ 163.783475][ T8755] ? do_raw_spin_unlock+0x57/0x270 [ 163.788778][ T8755] oom_kill_process.cold+0x10/0x15 [ 163.793985][ T8755] out_of_memory+0x79a/0x1280 [ 163.798775][ T8755] ? lock_downgrade+0x880/0x880 [ 163.803824][ T8755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 163.810065][ T8755] ? oom_killer_disable+0x280/0x280 [ 163.815350][ T8755] ? find_held_lock+0x35/0x130 [ 163.820478][ T8755] mem_cgroup_out_of_memory+0x1ca/0x230 [ 163.826026][ T8755] ? memcg_event_wake+0x230/0x230 [ 163.831161][ T8755] ? do_raw_spin_unlock+0x57/0x270 [ 163.836362][ T8755] ? _raw_spin_unlock+0x2d/0x50 [ 163.841481][ T8755] try_charge+0x102c/0x15c0 [ 163.845980][ T8755] ? find_held_lock+0x35/0x130 [ 163.850751][ T8755] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 163.856314][ T8755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 163.862725][ T8755] ? kasan_check_read+0x11/0x20 [ 163.867581][ T8755] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 163.873133][ T8755] mem_cgroup_try_charge+0x24d/0x5e0 [ 163.878424][ T8755] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 163.884069][ T8755] __handle_mm_fault+0x1e1a/0x3eb0 [ 163.889186][ T8755] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 163.894906][ T8755] ? find_held_lock+0x35/0x130 [ 163.899669][ T8755] ? handle_mm_fault+0x292/0xa90 [ 163.904810][ T8755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 163.911243][ T8755] ? kasan_check_read+0x11/0x20 [ 163.916357][ T8755] handle_mm_fault+0x3b7/0xa90 [ 163.921139][ T8755] __do_page_fault+0x5ef/0xda0 [ 163.926122][ T8755] do_page_fault+0x71/0x57d [ 163.930711][ T8755] ? page_fault+0x8/0x30 [ 163.935124][ T8755] page_fault+0x1e/0x30 [ 163.939286][ T8755] RIP: 0033:0x42f7cc [ 163.943289][ T8755] Code: 83 c0 17 41 55 41 54 55 53 48 89 c5 48 83 e5 f0 48 89 fb 48 81 ec 98 00 00 00 48 83 f8 20 b8 20 00 00 00 48 0f 42 e8 48 85 ff <48> 89 74 24 08 0f 84 3a 08 00 00 48 3b 2d 9a 57 64 00 77 70 89 ef [ 163.964201][ T8755] RSP: 002b:00007ffe18904fc0 EFLAGS: 00010202 [ 163.970368][ T8755] RAX: 0000000000000020 RBX: 0000000000713640 RCX: 00000000004585e4 [ 163.978433][ T8755] RDX: 00007ffe189050b0 RSI: 0000000000008030 RDI: 0000000000713640 [ 163.986752][ T8755] RBP: 0000000000008040 R08: 0000000000000001 R09: 0000555556792940 [ 163.994731][ T8755] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe18906290 [ 164.003161][ T8755] R13: 00007ffe18906280 R14: 0000000000000000 R15: 00007ffe18906290 [ 164.014051][ T8755] memory: usage 448kB, limit 0kB, failcnt 56 [ 164.021018][ T8755] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 164.029145][ T8755] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 164.036207][ T8755] Memory cgroup stats for /syz3: cache:0KB rss:76KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:76KB inactive_file:0KB active_file:0KB unevictable:0KB [ 164.058518][ T8755] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8755,uid=0 [ 164.075723][ T8755] Memory cgroup out of memory: Killed process 8755 (syz-executor.3) total-vm:72448kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 164.090833][ T1042] oom_reaper: reaped process 8755 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 170.431536][ T104] device bridge_slave_1 left promiscuous mode [ 170.439800][ T104] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.501279][ T104] device bridge_slave_0 left promiscuous mode [ 170.507509][ T104] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.562103][ T104] device bridge_slave_1 left promiscuous mode [ 170.568338][ T104] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.625776][ T104] device bridge_slave_0 left promiscuous mode [ 170.636803][ T104] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.702069][ T104] device bridge_slave_1 left promiscuous mode [ 170.708397][ T104] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.761195][ T104] device bridge_slave_0 left promiscuous mode [ 170.767434][ T104] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.821966][ T104] device bridge_slave_1 left promiscuous mode [ 170.828658][ T104] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.881691][ T104] device bridge_slave_0 left promiscuous mode [ 170.888116][ T104] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.653391][ T104] device hsr_slave_1 left promiscuous mode [ 184.695775][ T104] device hsr_slave_0 left promiscuous mode [ 184.755324][ T104] team0 (unregistering): Port device team_slave_1 removed [ 184.775781][ T104] team0 (unregistering): Port device team_slave_0 removed [ 184.799668][ T104] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 184.868232][ T104] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 185.024127][ T104] bond0 (unregistering): Released all slaves [ 185.173911][ T104] device hsr_slave_1 left promiscuous mode [ 185.245849][ T104] device hsr_slave_0 left promiscuous mode [ 185.305026][ T104] team0 (unregistering): Port device team_slave_1 removed [ 185.326327][ T104] team0 (unregistering): Port device team_slave_0 removed [ 185.347279][ T104] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 185.396584][ T104] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 185.538923][ T104] bond0 (unregistering): Released all slaves [ 185.723757][ T104] device hsr_slave_1 left promiscuous mode [ 185.789123][ T104] device hsr_slave_0 left promiscuous mode [ 185.848548][ T104] team0 (unregistering): Port device team_slave_1 removed [ 185.873325][ T104] team0 (unregistering): Port device team_slave_0 removed [ 185.894570][ T104] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 185.952102][ T104] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 186.062104][ T104] bond0 (unregistering): Released all slaves [ 186.246130][ T104] device hsr_slave_1 left promiscuous mode [ 186.305523][ T104] device hsr_slave_0 left promiscuous mode [ 186.365187][ T104] team0 (unregistering): Port device team_slave_1 removed [ 186.385965][ T104] team0 (unregistering): Port device team_slave_0 removed [ 186.408490][ T104] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 186.466937][ T104] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 186.603900][ T104] bond0 (unregistering): Released all slaves 04:11:07 executing program 1: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r4, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:11:07 executing program 5: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r4, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:11:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffffd4, 0x0, 0x0, 0x10}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0xe, 0xf2, &(0x7f0000000300), 0x0, 0x1a3}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000800)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 04:11:07 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7}, 0x3c) 04:11:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="2e00000015008100a00f80ecdb4cb904024865160b00d11468b26efb120003000800da1ba6bf19a9ffe200000000", 0x2e}], 0x1}, 0x0) 04:11:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x1400, 0x0}, 0x40000100) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x0) 04:11:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x1400, 0x0}, 0x40000100) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x0) 04:11:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x1400, 0x0}, 0x40000100) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x0) 04:11:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x1400, 0x0}, 0x40000100) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="fa0c000016008152915a655267d7d137ab2ff96e27bf28b285fe3903a44a6017edcaa3a2b4dade3baee72569b51366463fedf5e787c05b0cb5927a3a7edfb4d078e9ae1504d489e058be9fafaa633705b6d4bf6a01f2cd9ebf19724a1b0b9760612582bccd3983ce4474844c065e914dab8bbd52a45f431678bfe28633bf7c8dc83df809238ed87f1e393883ef750ce79c6f84e5e5de176e2f26024e4e3a3d8fbdaf3254022f265d8ccc5fd7205d9d9c2c407ec58162523082d81a39c43f782332ba8e82b4107a049cb82bba8b5edd80473844291437b8d22edca68047582e6be601e9df5e60a32c7cd202c5a30b8b606e43362739551cbb013b65e238f41cc00d7900140cf06b7bc9030f2563bcf9d4f4b7f48c79ec1a323d06276a0a3f8846b7c62b66f9709cabcaad234c53f3bc9b11165a6321f1db1057f076cfaebf8fbfa033fdc1dc2c3e314b36b3b3dd50425447da8bc5938ff7a17361100ab0b1ffeab7ac487411824224781eb9cdd4edef57ae91cd61f56a56c0599cfc3a491447207610f242da6cd6b030ae5f35e3181c44ae68665a023759b9ef4358db46107edc49194aed72b62600ec0ae4fc9065be059fc010cd6e6c9ea77c666b5e25693fbcf595e3e57113ff3a0e0c63d0604a16ea5adb8b7b54d47d4d8804612fde571863064528a49bf684d8a880a11afd819f186c177c49cac3ba1e9d1aa7ad0ff36b9e36d73c05b8abcaf96df0bacd2c9653f30ec29e1284af8749a9b2803c2727e992a6e65df192e1875c3e6d3553ffb7cb34ffee8f8ac0123c390454b42a0316952cbc9949376d9320ec207f77c2d5eb9e86d720cf8e9008a9a51932b45cd4cab21414c92d1c20f9e15e3fc16c7ce181e9ab19b01b70343934c823b1215e173405dd225233823cd4a604a77f06b14eb05b860e6cf8790335788c43abe9de1598e9952e5c7e6b2f8b17b1008ff3033e7d1635b008834bdf4054e6195e55000827c6202b227dde06f23ae21c00b371bdb6b7ea47b2e78844b52a77f9f0929790dcd7df2752e4af092d539c87c18751a5eb3eb4d38a2a0e070064b4ffaacff0543b115cc89f6c7e78f12147ebfcf1c80bac8f98deb59cbe670adb4cd1882a7e0ca4ba85ae9d445223ffb32301d46c0c9b05a830cbea0f72294ab3b539e4ed7cac2e22b235e8ceedeb643fb90b061a58368e76036ff3c1828d8a4e21288662afb6f2acab00d734db7ffc8373a928571819ce9ea6cb0956a6093b2b1f65662b76bc6ac8a171451714e1d0e4ff76470c7651d3cf16f37cb5547317e4fef51e4fb471de6ffbb90c2dd4a64266c4c2f75fc62e58ec306fb92212fb262d8b138899a3b53e67cde2f97d94cd2265cc04d32b29edf77e75b1f88372495cb2937f183bfc8604d72efb3af5c1f41b665b25592676b0ad2185478eade7e663e743e0e09cce6224c787ce1d789dc4a9b350bfe3a75f551341b11dd96cdaea17989dad565b16324a69842dc29a0ed16744ea5935598ac8238e146139189927a14d3b2863044b63b468ae75f48fab68ad235c36daffebfe4b468fc9b13198b1a683dcd3b3b4294ba22caddbacf8792d5783bc12e2538e4609e6bb6e9eeab98a06452c252a657f400260458c29fae8879097698c9aba2b2d889fc78f00d0d8271e09e8542b71018be6ff8cb03cb423e79303047d6ce124a00f64461b899bbddc4fe87ff677533391e16c01fa9cd6420bdc856c4c7f057b249ee9817efd6ab2cd02eb887d2631435ef2d5a1c7e57ac046ef615a1285ca89ade18ae69af3b3f8f76ca8aa060e373c0f99424fe1c5fadc72fe145fd2d4e4da4b78597890516857de188fcdaf15e3b0871b346cd39ab772cc25fab49e60c818cde934b137144adfc4fbde3ddbeccce9679f02b66746e822c67b3ed5fdafb4a936a2683b39a002115ecd62220605ca542610a80f2e3530aa89d3ed6ed9c57bbfd5db3a0b62786a608309a355443c616032008f9458b2f10db93e29470192370084e9322c309c9b23333b46d04e79176659503ad4b05deebb3c67d715ee6e84a89002ea6f7f71bf41ad36b42c8ae01c97174dbb641e50641aba60c291a84e906c013087370a5043e07d36fcead378f6c1e6ed3f5ac695124b82b20261cf7c9b82172e09c81d7d39eed72aee5678613a3c671ddd44f2c7c75a3b5d316aa165d56594fccab20903d7f503a08928e76c779918b2463b720ee6367a43e494a1db3ed1a80690e665570c01ce7eb979cdd95d4e1ca51730eb2cd63ffb2a56049601627c9788254945142dce85adbe1eb5997d16cdfe2a3758b13dc6bb121e2206ae64206868c1c5e89a101bc121719ac435dcad093f5f67cefd863cc7c8f3fc8a9dc62a83c115f1ce714b18af067951aa06dd9bb4ed98a820bf4704d156977caa4e6415b2a0df0386e2f6a061bf44abc8a397cf4abdafc51b78ebec9831f3c60fde6e62a1fd082903080aef20ff8de8bc0dced06f627514600539ca7114a088848da4244a85b4cf5b976d3a698c9a568d417e276917baba05d1a02181db2e6cc35986da4ccc63f8cd8e85a4a923dd27e2f499664601fdc44fdf46e2d2880cd5a7ece89c370234c438dcc0b43865cc62bad21e9dc37da758cbe01752f02fd9cbfe98630a30a78bb1239e25cdaba3d45d13cd3e7216d9d8070f3ff1a0cd9a0c91f29974c98f2677ba88c1091bde4be0cd37ea5eeb3b9cd59560a00ddd40bbd60ffb8d4daa973ef0977c18dd4b38a605cee957872dca85787c37b6931293eddb77015faf143d1d28d24822d1a5d134799e8175a38b255aaf0e39b68c7f734e2e1e7044626daa84c9113e86d86ef63c86010000000000000061dcf516c32d49478f7af30d52baa18ea6b0fc286c06b7e4ee019bf3fe74845a652d4a52aaa241a189c411e90e2953863a2bc4124e573607b94cdff19e280731824931a83f056cb5857672619b97ce38081592c0c319ce72e04e9eadce89775cfb5a4b2842663bc79bde565435cbcd46c4d505ceef7dde86512d39d4cb270deb7e79ebf8602bdc0d76c3e833d36ee08be10be634f44056c2f3fd6a328c7cd562e9c96ff7845fc3df81a876bb07f1cc833bed6ca1dc5cf935a4e959db6a4fae6edbc45357d8758faa9cd04cd41eb6efcfbd91658519bf520b90107f767d126854818485e98cb7ef56804de6950bf4e72098a949d14ea0e4e9f2534cf16cac0aeb970fc5c39f37e93910d5c99ac163792260d2280ec5c9a79bf295588ec23f524aae65f800f9c39e338f3d66b1a69e5488e04823eab36ae6ec6a2c5ce133ccd819a2b217b1ab7f4afd1697bb42929b3131358b5421c83f925571934442d0fd0ce3990d4e5d31d8b956f76df3c2f8533e46b892c88692ce009155dd5c7dbe4c86874b95762650f63e4b4aabb41320978b05b80cfe8fa2830904ef6b5c4f7ad46ca5dac151c9077c4d2c6adfe5066a8eb09a9bc6892330ea2b259a53c7137f8498254e1b04bf920c35c5333c4d640b11da60917ae921037b4aedbd6a0fbeeaf88ef6defc830552b4cbe3fe2a844806a48923dd428ea1c8d797bd8e6aabd1d1a8c97c8038b627120a77f4e47fa1f788aa9da268b0ec10fc453cb722685df76547dbf55a16663aa2b2a51e9c52456cccdf682592d1369dd12e3d3cb504e0f2d7004e62c297d5a25d0298045dae8fca8cb795ea57288b85a7e705820087d55ca6c42e920e2aa1174e128622cf64a197fd728cb2949536ba63e8bda8589261f1377caea37302e47228d3708a5666c66ba711d3c0b310a8c47e86d26597299d523c28c90e4feab43e950f398f7b61ccf7e6490d75ba6d8214e2d5ef2d7a088db490e1ebacf4e6eecc896cb1c704f0a8fcdf4ccb5dfa53eaf43d709287f36c10188c19fd59da7d73494de089c1b0a69ee22dcb847001c5317846a876bee1685d11c4db0673ec4c3a12008bb719650525b3c39e2b0469edda93830b3f1bde3e5b0b4637197866bb08c5858cf0d9876e3c7cad54169887bf9c80f9f4be362e1bc8c27f3434e9a918bac355c184bd899b9aebe6be20e70c0c69234342eb8b57aa9ffb7797a32df91cec2bbc90201658ca2297bf1fe68e65363867e1f6ad79b827f363d64fbd3b188d95307d011c4ce5bf4407908c058eeb97ec98dd0ebfdab6b348fa387f2a7573cac25344c983e8fd526c30ee6d59fe99a30c7d7e2864aa22bfa49df5f32da68309cab3ed9c2ce69b6ecb8508ce28a43ebd6c809b8afd07a4606e664965d316f3707a3abee9bcdc32a78031b0171fb565d90c16cd56e5792c0cf618b799715f32538e38f493d4e19ec76fc8a07576a13975706bfc2bb1516c2d18a4385cc37a206eac6c9fb8d073576a1f56d529e407154fdd0c40d079ae44962c26743b4bf5950ac5ee34c5d7bd60b364ce670958112c37b9829bed7e1327356d6b94af3ba020c2337b2dba37d00af8a128a614390cdde62ce871f948427fb5c187df9a1540a5cc71da1a86144acbfd94bf433f744f0c4f2a675eba3ed251c5b11b08dfefc726c0394a9b75121d88467ed4b2cd69819dfe50693a4a4c8370d3af12f41c0067283bbb5a90044a340fc357a11081a6c13bb9c32d9caa448479fd5f0302b6729ca7233094540b14546d6bcc15771c2686279b34f9c0914f5306d0fabd5979266ea01a17a22507e560dbf904dd62c40e2bccb468710ee4c1caf4e786", 0xcfa}], 0x1}, 0x0) 04:11:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/\x00~WMz\x0f0\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xe8\xd3\x83dx-c\xb6a(T\xb2\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e\t\x00\x00\x00\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\n\xd8\x1e\xd8\xda2NDcq\xef\x1eu\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xeb\x8e\x14\x03w\xaao\xb3\x17\x00\xf18\xdcM~\b\xd5|(*g\xdeZu\xc5G\x1f\x81\x00\x00\x00\x00\x00\x00\x00\x9bS\x98\x17\xdb\xa7\x7fK\x93\xcf\xe7-\x19\\I\x1f\xb6\'d\xfce\x92\xe0m\xd0\xa7\xf6:\xbb\xd4\xc6\xe3/_\xa1\x9fnM\xc0t\xd8$\xfc|i\x80@\xc7\xe8\xb2q6\xfa\xd5~b\x89B\xb4i\xeeGh\\\x94\"\xbf\xc1\x99*Lv\xa4\xa3\x91&\xd2\x14\x02\xb9g-*\xa0\xf8\x9b\x04,\xa8\x98%-\x1e%\xf8L\x01\xbe\x87\xd4\x8c\x9d\x9c\r9\xfb#\x1d\xd7\xc0\xe6E\x81\x16c\xeaN\xb8\xfb\x06\xd2\x01\a\xc7\x9e\xb1\x85Xu\xc9v\xe58\xe6\xe3\xf3\x16\xc4\x88\x03%M3\xec=c\x84\xeb\xc2\xb0\x87\xfdb\xa9\xa4\xe6\xd8\xe5\xeaq/\x1e\xbcW\xec+', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x5460, 0x20000004) 04:11:07 executing program 4: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x400, 0x8, 0x3, 0xfffffffffffffffb, 0x0, 0x20, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x3ff, 0x1778, 0x1, 0x0, 0x8, 0x80000, 0x0, 0x7, 0x0, 0x4, 0x7fff, 0xad, 0x9, 0x5e2, 0x1, 0x6, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x2}, 0x80, 0x6, 0x101, 0x7, 0xf4fd, 0x7a, 0xa932}, 0x0, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x6d000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) write$cgroup_subtree(r1, 0x0, 0x0) 04:11:08 executing program 4: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x400, 0x8, 0x3, 0xfffffffffffffffb, 0x0, 0x20, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x3ff, 0x1778, 0x1, 0x0, 0x8, 0x80000, 0x0, 0x7, 0x0, 0x4, 0x7fff, 0xad, 0x9, 0x5e2, 0x1, 0x6, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x2}, 0x80, 0x6, 0x101, 0x7, 0xf4fd, 0x7a, 0xa932}, 0x0, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x6d000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) write$cgroup_subtree(r1, 0x0, 0x0) [ 207.581156][ T8698] device bridge_slave_1 left promiscuous mode [ 207.596363][ T8698] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.641333][ T8698] device bridge_slave_0 left promiscuous mode [ 207.648421][ T8698] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.252839][ T8698] device hsr_slave_1 left promiscuous mode [ 209.314311][ T8698] device hsr_slave_0 left promiscuous mode [ 209.374218][ T8698] team0 (unregistering): Port device team_slave_1 removed [ 209.385608][ T8698] team0 (unregistering): Port device team_slave_0 removed [ 209.397014][ T8698] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 209.454894][ T8698] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 209.539188][ T8698] bond0 (unregistering): Released all slaves [ 209.637668][ T8818] IPVS: ftp: loaded support on port[0] = 21 [ 209.660990][ T8823] IPVS: ftp: loaded support on port[0] = 21 [ 209.662699][ T8826] IPVS: ftp: loaded support on port[0] = 21 [ 209.676509][ T8825] IPVS: ftp: loaded support on port[0] = 21 [ 209.679176][ T8824] IPVS: ftp: loaded support on port[0] = 21 [ 209.789412][ T8818] chnl_net:caif_netlink_parms(): no params data found [ 209.922152][ T8818] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.929447][ T8818] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.937578][ T8818] device bridge_slave_0 entered promiscuous mode [ 209.948073][ T8818] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.955470][ T8818] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.963812][ T8818] device bridge_slave_1 entered promiscuous mode [ 210.034516][ T8818] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 210.092250][ T8818] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 210.187889][ T8825] chnl_net:caif_netlink_parms(): no params data found [ 210.199840][ T8818] team0: Port device team_slave_0 added [ 210.234973][ T8823] chnl_net:caif_netlink_parms(): no params data found [ 210.254857][ T8818] team0: Port device team_slave_1 added [ 210.306184][ T8826] chnl_net:caif_netlink_parms(): no params data found [ 210.371397][ T8824] chnl_net:caif_netlink_parms(): no params data found [ 210.453064][ T8818] device hsr_slave_0 entered promiscuous mode [ 210.510505][ T8818] device hsr_slave_1 entered promiscuous mode [ 210.604026][ T8825] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.618479][ T8825] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.626998][ T8825] device bridge_slave_0 entered promiscuous mode [ 210.646025][ T8823] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.660917][ T8823] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.669082][ T8823] device bridge_slave_0 entered promiscuous mode [ 210.696057][ T8826] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.705537][ T8826] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.718536][ T8826] device bridge_slave_0 entered promiscuous mode [ 210.749390][ T8825] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.757455][ T8825] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.772235][ T8825] device bridge_slave_1 entered promiscuous mode [ 210.780477][ T8823] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.787550][ T8823] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.802330][ T8823] device bridge_slave_1 entered promiscuous mode [ 210.811405][ T8818] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.818477][ T8818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.826052][ T8818] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.833334][ T8818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.846485][ T3294] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.855493][ T3294] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.884218][ T8826] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.893400][ T8826] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.903927][ T8826] device bridge_slave_1 entered promiscuous mode [ 210.959076][ T8824] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.968348][ T8824] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.976376][ T8824] device bridge_slave_0 entered promiscuous mode [ 210.989747][ T8824] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.997665][ T8824] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.006136][ T8824] device bridge_slave_1 entered promiscuous mode [ 211.015498][ T8823] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 211.026884][ T8825] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 211.067993][ T8823] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.095229][ T8825] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.112456][ T8826] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 211.126313][ T8824] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 211.136578][ T8826] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.177491][ T8818] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.187122][ T8824] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.196930][ T8823] team0: Port device team_slave_0 added [ 211.216645][ T8825] team0: Port device team_slave_0 added [ 211.225326][ T8825] team0: Port device team_slave_1 added [ 211.238211][ T8823] team0: Port device team_slave_1 added [ 211.245578][ T8826] team0: Port device team_slave_0 added [ 211.259033][ T8818] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.303089][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.311184][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.320635][ T8826] team0: Port device team_slave_1 added [ 211.337212][ T8824] team0: Port device team_slave_0 added [ 211.393247][ T8823] device hsr_slave_0 entered promiscuous mode [ 211.430665][ T8823] device hsr_slave_1 entered promiscuous mode [ 211.542402][ T8825] device hsr_slave_0 entered promiscuous mode [ 211.600599][ T8825] device hsr_slave_1 entered promiscuous mode [ 211.643317][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.652885][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.661473][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.671602][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.679971][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.690616][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.699562][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.706935][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.716676][ T8824] team0: Port device team_slave_1 added [ 211.762706][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.779277][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.788773][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.804621][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.814960][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 211.833392][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.843473][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.912481][ T8824] device hsr_slave_0 entered promiscuous mode [ 211.980822][ T8824] device hsr_slave_1 entered promiscuous mode [ 212.073418][ T8826] device hsr_slave_0 entered promiscuous mode [ 212.110638][ T8826] device hsr_slave_1 entered promiscuous mode [ 212.186016][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 212.194991][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.205090][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 212.215203][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 212.231883][ T8818] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 212.304362][ T8818] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 212.361213][ T8823] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.376319][ T8825] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.398849][ T8826] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.412989][ T8824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.426911][ T8825] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.445880][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.466864][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.476134][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.485129][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.499228][ T8823] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.549477][ T8826] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.559551][ T8838] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 212.571936][ T8838] CPU: 0 PID: 8838 Comm: syz-executor.1 Not tainted 5.2.0-rc1+ #1 [ 212.579801][ T8838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.585449][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.590836][ T8838] Call Trace: [ 212.590870][ T8838] dump_stack+0x172/0x1f0 [ 212.590893][ T8838] dump_header+0x10f/0xb6c [ 212.590912][ T8838] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 212.590928][ T8838] ? ___ratelimit+0x60/0x595 [ 212.590942][ T8838] ? do_raw_spin_unlock+0x57/0x270 [ 212.590959][ T8838] oom_kill_process.cold+0x10/0x15 [ 212.590976][ T8838] out_of_memory+0x79a/0x1280 [ 212.590992][ T8838] ? __sched_text_start+0x8/0x8 [ 212.591018][ T8838] ? oom_killer_disable+0x280/0x280 [ 212.591045][ T8838] mem_cgroup_out_of_memory+0x1ca/0x230 [ 212.591061][ T8838] ? memcg_event_wake+0x230/0x230 [ 212.591085][ T8838] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 212.591106][ T8838] ? cgroup_file_notify+0x140/0x1b0 [ 212.591123][ T8838] memory_max_write+0x169/0x300 [ 212.591145][ T8838] ? mem_cgroup_write+0x360/0x360 [ 212.600632][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.602870][ T8838] ? cgroup_file_write+0x86/0x790 [ 212.607530][ T3692] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.611596][ T8838] cgroup_file_write+0x241/0x790 [ 212.611615][ T8838] ? mem_cgroup_write+0x360/0x360 [ 212.611627][ T8838] ? kill_css+0x380/0x380 [ 212.611651][ T8838] ? kill_css+0x380/0x380 [ 212.617915][ T3692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.624040][ T8838] kernfs_fop_write+0x2b8/0x480 [ 212.624060][ T8838] __vfs_write+0x8a/0x110 [ 212.624071][ T8838] ? kernfs_fop_open+0xd80/0xd80 [ 212.624089][ T8838] vfs_write+0x20c/0x580 [ 212.635772][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.636420][ T8838] ksys_write+0x14f/0x290 [ 212.642401][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.646539][ T8838] ? __ia32_sys_read+0xb0/0xb0 [ 212.646558][ T8838] ? do_syscall_64+0x26/0x680 [ 212.646578][ T8838] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.659592][ T3692] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.660022][ T8838] ? do_syscall_64+0x26/0x680 [ 212.666515][ T3692] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.672333][ T8838] __x64_sys_write+0x73/0xb0 [ 212.672351][ T8838] do_syscall_64+0xfd/0x680 [ 212.672373][ T8838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.687091][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 212.687613][ T8838] RIP: 0033:0x459279 [ 212.687641][ T8838] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 212.698883][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 212.700854][ T8838] RSP: 002b:00007f76f594cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 212.700872][ T8838] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 212.700879][ T8838] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 212.700885][ T8838] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 212.700896][ T8838] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f76f594d6d4 [ 212.700906][ T8838] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 212.721198][ T8838] memory: usage 2764kB, limit 0kB, failcnt 201887 [ 212.732026][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 212.736242][ T8838] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 212.748324][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.751785][ T8838] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 212.757185][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.774651][ T8838] Memory cgroup stats for /syz1: cache:0KB rss:2120KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2120KB inactive_file:0KB active_file:0KB unevictable:0KB [ 212.783393][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.787692][ T8838] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=8836,uid=0 [ 212.796733][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.797652][ T8838] Memory cgroup out of memory: Killed process 8836 (syz-executor.1) total-vm:72712kB, anon-rss:2144kB, file-rss:34816kB, shmem-rss:0kB [ 212.812778][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.813456][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.814218][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.858083][ T1042] oom_reaper: reaped process 8836 (syz-executor.1), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 212.886248][ T8825] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 213.128273][ T8825] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 213.143607][ T8824] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.152928][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.161116][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.171476][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.182259][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.192050][ T3294] bridge0: port 1(bridge_slave_0) entered blocking state 04:11:14 executing program 4: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x400, 0x8, 0x3, 0xfffffffffffffffb, 0x0, 0x20, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x3ff, 0x1778, 0x1, 0x0, 0x8, 0x80000, 0x0, 0x7, 0x0, 0x4, 0x7fff, 0xad, 0x9, 0x5e2, 0x1, 0x6, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x2}, 0x80, 0x6, 0x101, 0x7, 0xf4fd, 0x7a, 0xa932}, 0x0, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x6d000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) write$cgroup_subtree(r1, 0x0, 0x0) [ 213.194194][ T8818] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 213.199282][ T3294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.219573][ T8818] CPU: 1 PID: 8818 Comm: syz-executor.1 Not tainted 5.2.0-rc1+ #1 [ 213.227675][ T8818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.237830][ T8818] Call Trace: [ 213.241822][ T8818] dump_stack+0x172/0x1f0 [ 213.246520][ T8818] dump_header+0x10f/0xb6c [ 213.250979][ T8818] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 213.256899][ T8818] ? ___ratelimit+0x60/0x595 [ 213.261624][ T8818] ? do_raw_spin_unlock+0x57/0x270 [ 213.266760][ T8818] oom_kill_process.cold+0x10/0x15 [ 213.272000][ T8818] out_of_memory+0x79a/0x1280 [ 213.277041][ T8818] ? lock_downgrade+0x880/0x880 [ 213.285669][ T8818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 213.292708][ T8818] ? oom_killer_disable+0x280/0x280 [ 213.299936][ T8818] ? find_held_lock+0x35/0x130 [ 213.306555][ T8818] mem_cgroup_out_of_memory+0x1ca/0x230 [ 213.306567][ T8818] ? memcg_event_wake+0x230/0x230 [ 213.306585][ T8818] ? do_raw_spin_unlock+0x57/0x270 [ 213.306605][ T8818] ? _raw_spin_unlock+0x2d/0x50 [ 213.306620][ T8818] try_charge+0x102c/0x15c0 [ 213.306630][ T8818] ? find_held_lock+0x35/0x130 [ 213.306650][ T8818] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 213.375338][ T8818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 213.382171][ T8818] ? kasan_check_read+0x11/0x20 [ 213.387240][ T8818] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 213.393418][ T8818] mem_cgroup_try_charge+0x24d/0x5e0 [ 213.399152][ T8818] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 213.405337][ T8818] wp_page_copy+0x416/0x1770 [ 213.412440][ T8818] ? do_wp_page+0x486/0x1500 [ 213.418179][ T8818] ? pmd_pfn+0x1d0/0x1d0 [ 213.422972][ T8818] ? lock_downgrade+0x880/0x880 [ 213.428134][ T8818] ? swp_swapcount+0x540/0x540 [ 213.433100][ T8818] ? do_raw_spin_unlock+0x57/0x270 [ 213.438636][ T8818] ? kasan_check_read+0x11/0x20 [ 213.443645][ T8818] ? do_raw_spin_unlock+0x57/0x270 [ 213.448865][ T8818] do_wp_page+0x48e/0x1500 [ 213.453393][ T8818] ? finish_mkwrite_fault+0x540/0x540 [ 213.459161][ T8818] __handle_mm_fault+0x22e3/0x3eb0 [ 213.464514][ T8818] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 213.470052][ T8818] ? find_held_lock+0x35/0x130 [ 213.474812][ T8818] ? handle_mm_fault+0x292/0xa90 [ 213.480809][ T8818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 213.487041][ T8818] ? kasan_check_read+0x11/0x20 [ 213.491896][ T8818] handle_mm_fault+0x3b7/0xa90 [ 213.497618][ T8818] __do_page_fault+0x5ef/0xda0 [ 213.502502][ T8818] do_page_fault+0x71/0x57d [ 213.507266][ T8818] ? page_fault+0x8/0x30 [ 213.511705][ T8818] page_fault+0x1e/0x30 [ 213.516199][ T8818] RIP: 0033:0x430356 [ 213.520117][ T8818] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 213.540480][ T8818] RSP: 002b:00007ffcbd1f3820 EFLAGS: 00010206 [ 213.546532][ T8818] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 213.555097][ T8818] RDX: 0000555556a08930 RSI: 0000555556a10970 RDI: 0000000000000003 [ 213.563239][ T8818] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556a07940 [ 213.571219][ T8818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 213.579223][ T8818] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 213.588830][ T8818] memory: usage 432kB, limit 0kB, failcnt 201896 [ 213.589238][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.605863][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.606656][ T8818] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 213.614598][ T3294] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.627030][ T8818] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 213.628844][ T3294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.636264][ T8818] Memory cgroup stats for /syz1: cache:0KB rss:16KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:16KB inactive_file:0KB active_file:0KB unevictable:0KB [ 213.643574][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.670424][ T8818] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=8818,uid=0 [ 213.674407][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.694657][ T8818] Memory cgroup out of memory: Killed process 8818 (syz-executor.1) total-vm:72448kB, anon-rss:76kB, file-rss:34824kB, shmem-rss:0kB [ 213.698613][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.712884][ T1042] oom_reaper: reaped process 8818 (syz-executor.1), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 213.721380][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.742969][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.753111][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.762180][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.772014][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.783525][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.791719][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.799550][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.987313][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.998064][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.010920][ T8656] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.018737][ T8656] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.027257][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.037402][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.046405][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.055485][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.064140][ T8656] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.071352][ T8656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.079716][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.089920][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.098996][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.114400][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.131430][ T8656] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.140544][ T8656] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.149675][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.158497][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.167415][ T8656] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.175297][ T8656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.183100][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.195841][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.221239][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.242572][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.250864][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.259990][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.270021][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.278154][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.460656][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.474888][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.483767][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.492714][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.502760][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.511439][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.519787][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.528873][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.537560][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.546516][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.555276][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.564429][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.573755][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.582390][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.591637][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.600150][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.608658][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.617125][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.628241][ T8825] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.637957][ T8824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.666891][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.746629][ T8823] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.783623][ T8824] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.804539][ T8826] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.185135][ T8860] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 215.210047][ T8860] CPU: 0 PID: 8860 Comm: syz-executor.5 Not tainted 5.2.0-rc1+ #1 [ 215.218092][ T8860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.228332][ T8860] Call Trace: [ 215.231733][ T8860] dump_stack+0x172/0x1f0 [ 215.236353][ T8860] dump_header+0x10f/0xb6c [ 215.241232][ T8860] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 215.247562][ T8860] ? ___ratelimit+0x60/0x595 [ 215.252477][ T8860] ? do_raw_spin_unlock+0x57/0x270 [ 215.257577][ T8860] oom_kill_process.cold+0x10/0x15 [ 215.263302][ T8860] out_of_memory+0x79a/0x1280 [ 215.268257][ T8860] ? lock_downgrade+0x880/0x880 [ 215.273644][ T8860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 215.280072][ T8860] ? oom_killer_disable+0x280/0x280 [ 215.285527][ T8860] ? find_held_lock+0x35/0x130 [ 215.290660][ T8860] mem_cgroup_out_of_memory+0x1ca/0x230 [ 215.296680][ T8860] ? memcg_event_wake+0x230/0x230 [ 215.301714][ T8860] ? do_raw_spin_unlock+0x57/0x270 [ 215.306825][ T8860] ? _raw_spin_unlock+0x2d/0x50 [ 215.312041][ T8860] try_charge+0x102c/0x15c0 [ 215.317094][ T8860] ? find_held_lock+0x35/0x130 [ 215.322268][ T8860] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 215.327814][ T8860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 215.334489][ T8860] ? kasan_check_read+0x11/0x20 [ 215.339419][ T8860] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 215.345220][ T8860] mem_cgroup_try_charge+0x24d/0x5e0 [ 215.350817][ T8860] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 215.356472][ T8860] __handle_mm_fault+0x1e1a/0x3eb0 [ 215.361682][ T8860] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 215.367269][ T8860] ? find_held_lock+0x35/0x130 [ 215.372362][ T8860] ? handle_mm_fault+0x292/0xa90 [ 215.377697][ T8860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 215.383948][ T8860] ? kasan_check_read+0x11/0x20 [ 215.388934][ T8860] handle_mm_fault+0x3b7/0xa90 [ 215.394199][ T8860] __do_page_fault+0x5ef/0xda0 [ 215.399227][ T8860] do_page_fault+0x71/0x57d [ 215.403821][ T8860] ? page_fault+0x8/0x30 [ 215.409553][ T8860] page_fault+0x1e/0x30 [ 215.413701][ T8860] RIP: 0033:0x410bbf [ 215.418293][ T8860] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 215.438346][ T8860] RSP: 002b:00007ffcfe1fec90 EFLAGS: 00010206 [ 215.444712][ T8860] RAX: 00007fe3cc00b000 RBX: 0000000000020000 RCX: 00000000004592ca [ 215.452929][ T8860] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 215.461096][ T8860] RBP: 00007ffcfe1fed70 R08: ffffffffffffffff R09: 0000000000000000 [ 215.469079][ T8860] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcfe1fee60 [ 215.477519][ T8860] R13: 00007fe3cc02b700 R14: 0000000000000001 R15: 000000000075bfcc [ 215.487165][ T8860] memory: usage 3052kB, limit 0kB, failcnt 34 [ 215.493622][ T8860] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 215.501641][ T8860] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 215.508623][ T8860] Memory cgroup stats for /syz5: cache:0KB rss:2120KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB [ 215.508663][ T8860] writeback:0KB swap:0KB inactive_anon:0KB active_anon:2120KB inactive_file:0KB active_file:0KB unevictable:0KB [ 215.534112][ T8860] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=8860,uid=0 [ 215.579598][ T8874] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 215.606534][ T8860] Memory cgroup out of memory: Killed process 8860 (syz-executor.5) total-vm:72712kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB [ 215.628789][ T1042] oom_reaper: reaped process 8860 (syz-executor.5), now anon-rss:0kB, file-rss:34884kB, shmem-rss:0kB 04:11:16 executing program 5: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88<\x13=\xb5\xe3IW\xb3%^@\xb2\a/\"!&U\x0f\xb9\xb5\xa0Q\'\x81d\bD|k\xd2F\x14\'\xe5\xbfr\x1c\xbaHl\xdbb^#\x93u3j\xfd\xc5\xd5\x8b>K\xe0\xeb\xcflc\xd5 \xb8\xd0\x8a\xb8G\xb1\xfcT\x9d\xd6\x81O\xc9\xb8q\xe5$\xfa\xa0\xc4\x8c\x05\x0e\xc4\xe8?/\xc1p\xa6}\x8cWq\xc4\x92\xa6:73\x1a\xceN~9.y\xac\xe9>\xcb\xf8\xa5\xce\\\xdb~\xca\x92P\x96_\xcb\xae\x1cx\xae\xdf\x0e\x13?VUkr\x14\x95iH\x85\xd3k\x18P\xe0\xe4\x03u\xf5%\x00\x87_;\x9aky\xe0]\x01_\xb8\xcdL\xe26(\x8bra\x05`\xce&\xfbOt\xbaf\xad;\xe5p2\xb1\xfd\xe5><\v\xf4\xcbR\xfa\xbb\xdd\x01%\x89\x8a\xfd3\xe3T\xe8\xdfa\xb0c\xce\xdaN\x91\xd9`\x88\xa8\xe8g\xc2\x97\x1b\xcdy\xe13Z&\xf8\xba{O\xc8@\x98\t\xa8F\x9f\x7f\xf61\xb1\x0fX\xde\xb7d\xf2\x94xF\xfd\x96\'\xadw\x1f\xdd\x8e\xa1\xe1fcq?2\x8dW~r\xa4\xd4q\x9b;z\tp\x84l\x0e9\xe2\xcaDm\xa7\x96\xb7_\xaf&\x84r`\x88\xb1Cb\xe0\xf9_\x8c\xbbo\xbb\xdak\xab(#\xde\xe1\xc7drb\xc6\xca\xf2\x89\x18\x0eV\r\a\rq\x8c\xf5\x8e\x9f\x11r\b\xf7\xeb\x1e\x8a6>\xfc0', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x27f) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffb4) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffd11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r4, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:11:16 executing program 4: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x400, 0x8, 0x3, 0xfffffffffffffffb, 0x0, 0x20, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x3ff, 0x1778, 0x1, 0x0, 0x8, 0x80000, 0x0, 0x7, 0x0, 0x4, 0x7fff, 0xad, 0x9, 0x5e2, 0x1, 0x6, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x2}, 0x80, 0x6, 0x101, 0x7, 0xf4fd, 0x7a, 0xa932}, 0x0, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x6d000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) write$cgroup_subtree(r1, 0x0, 0x0) 04:11:16 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x400, 0x8, 0x3, 0xfffffffffffffffb, 0x0, 0x20, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x3ff, 0x1778, 0x1, 0x0, 0x8, 0x80000, 0x0, 0x7, 0x0, 0x4, 0x7fff, 0xad, 0x9, 0x5e2, 0x1, 0x6, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x2}, 0x80, 0x6, 0x101, 0x7, 0xf4fd, 0x7a, 0xa932}, 0x0, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x6d000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) write$cgroup_subtree(r1, 0x0, 0x0) 04:11:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="180000000000001749bcac0001000000ec00000004"], 0x15}, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) sendmsg$kcm(r0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) 04:11:16 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e24}, 0x80, 0x0}, 0xe000) sendmsg$kcm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="a4", 0x1}], 0x1}, 0x8880) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000340)="ee", 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000c00)="b2", 0x1}], 0x1}, 0x0) 04:11:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="2e00000015008100a00f80ecdb4cb904024865160b00d11468b26efb120003000800da1ba6bf19a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 215.809213][ T8825] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 215.865056][ T8825] CPU: 0 PID: 8825 Comm: syz-executor.5 Not tainted 5.2.0-rc1+ #1 [ 215.874154][ T8825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.884592][ T8825] Call Trace: [ 215.887917][ T8825] dump_stack+0x172/0x1f0 [ 215.892268][ T8825] dump_header+0x10f/0xb6c [ 215.896805][ T8825] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 215.902763][ T8825] ? ___ratelimit+0x60/0x595 [ 215.907644][ T8825] ? do_raw_spin_unlock+0x57/0x270 04:11:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffff3) sendmsg(r1, &(0x7f0000001740)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x0, 0x0, 0x2, 0x0, {0xa, 0x4e22, 0xffffffffffffff33, @mcast2}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000440)="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", 0x1000}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000080)=@nfc={0x27, 0x0, 0x1, 0x6}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000140)="2b028cf609966f555b6be28f7f0408796c3db7caeb88cf4ea137c6ebb93746f571c3153cb28fbde84a88d89e3d54d6c27cf0a76cc6f0838de65a93ae15a9920fb2a9b1ddfe7babce0e59d946b1d470108de70e1655316dd7dbdcc4f91cd6b6284ee87e0dd5f51175778f6344ce6856a8005e797cc059a57d21a90b", 0x7b}], 0x1}, 0x400c0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r2 = socket$kcm(0x2, 0x3, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x381000, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)={[{0x2f, 'pids'}, {0x2f, 'rdma'}, {0x2d, 'cpu'}, {0x0, 'cpu'}, {0x0, 'cpu'}]}, 0x1b) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r6, &(0x7f0000000400), 0x0) openat$cgroup_ro(r4, &(0x7f0000000340)='cpuset.effective_mems\x00', 0x0, 0x0) sendmsg$kcm(r5, &(0x7f0000000400)={&(0x7f0000001440)=@rc={0x1f, {0x3, 0xe7, 0x5, 0x1, 0x2, 0x4}, 0x40}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001900)="27f9094f3b81e8bb7067446a42a134f3ee0e727eba35f0d49c430e172820bf7578764316bd0055abfc1b3d0b5b8fa27519010b50a402e1d72b69dc400cfa39effb684afba9bf06bbbeeabcee1c633cd42454b43429e57643f1246e96e71377a8092bae4d1bd673236c6b9caaf998847a440bfb37c0997c796b2d83014929a81fd24fbf26ab719d017d55eea22d9c5af4728ab03236c9e78670859ac73230bc20c73f9dbbe77cfc7963838b51b998db2479237d03489c57c54aa4975f7f1f917c1ecf1b79a1a6f0e40f8aed88b096c4043861ea59ba2778bd", 0xd8}], 0x1}, 0x10) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000040)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000800)={'caif0\x00', @broadcast}) close(r6) [ 215.912812][ T8825] oom_kill_process.cold+0x10/0x15 [ 215.917949][ T8825] out_of_memory+0x79a/0x1280 [ 215.922675][ T8825] ? lock_downgrade+0x880/0x880 [ 215.927554][ T8825] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 215.933843][ T8825] ? oom_killer_disable+0x280/0x280 [ 215.939060][ T8825] ? find_held_lock+0x35/0x130 [ 215.943963][ T8825] mem_cgroup_out_of_memory+0x1ca/0x230 [ 215.952077][ T8825] ? memcg_event_wake+0x230/0x230 [ 215.957216][ T8825] ? do_raw_spin_unlock+0x57/0x270 [ 215.962519][ T8825] ? _raw_spin_unlock+0x2d/0x50 [ 215.967399][ T8825] try_charge+0x102c/0x15c0 [ 215.971950][ T8825] ? find_held_lock+0x35/0x130 [ 215.976747][ T8825] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 215.982319][ T8825] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 215.988583][ T8825] ? kasan_check_read+0x11/0x20 [ 215.993500][ T8825] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 216.000688][ T8825] mem_cgroup_try_charge+0x24d/0x5e0 [ 216.006194][ T8825] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 216.013596][ T8825] __handle_mm_fault+0x1e1a/0x3eb0 [ 216.021166][ T8825] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 216.027776][ T8825] ? find_held_lock+0x35/0x130 [ 216.032672][ T8825] ? handle_mm_fault+0x292/0xa90 [ 216.039125][ T8825] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.045947][ T8825] ? kasan_check_read+0x11/0x20 [ 216.050831][ T8825] handle_mm_fault+0x3b7/0xa90 [ 216.055642][ T8825] __do_page_fault+0x5ef/0xda0 [ 216.060551][ T8825] do_page_fault+0x71/0x57d [ 216.066288][ T8825] ? page_fault+0x8/0x30 [ 216.066302][ T8825] page_fault+0x1e/0x30 [ 216.066318][ T8825] RIP: 0033:0x403672 [ 216.079431][ T8825] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 29 86 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 49 3b 05 00 48 [ 216.099702][ T8825] RSP: 002b:00007ffcfe1fde40 EFLAGS: 00010246 [ 216.099714][ T8825] RAX: 0000000000000000 RBX: 000000000003483f RCX: 0000000000412e80 [ 216.099720][ T8825] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffcfe1fef70 [ 216.099727][ T8825] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555555a19940 [ 216.099735][ T8825] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcfe1fef70 [ 216.099742][ T8825] R13: 00007ffcfe1fef60 R14: 0000000000000000 R15: 00007ffcfe1fef70 04:11:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="180000000000001749bcac0001000000ec00000004"], 0x15}, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) sendmsg$kcm(r0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) 04:11:17 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="2e00000015008100a00f80ecdb4cb904024865160b00d11468b26efb120003000800da1ba6bf19a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 216.280504][ T8887] device caif0 entered promiscuous mode 04:11:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0xffffffffa0008000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d0000768621681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60", 0x2c}], 0x1}, 0x0) 04:11:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="180000000000001749bcac0001000000ec00000004"], 0x15}, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) sendmsg$kcm(r0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) [ 216.525809][ T8825] memory: usage 716kB, limit 0kB, failcnt 43 [ 216.533499][ T8825] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 04:11:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0xffffffffa0008000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d0000768621681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60", 0x2c}], 0x1}, 0x0) [ 216.566999][ T8825] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 216.614913][ T8825] Memory cgroup stats for /syz5: cache:0KB rss:12KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:12KB inactive_file:0KB active_file:0KB unevictable:0KB [ 216.725296][ T8825] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=8825,uid=0 [ 216.806212][ T8825] Memory cgroup out of memory: Killed process 8825 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34824kB, shmem-rss:0kB [ 216.828441][ T1042] oom_reaper: reaped process 8825 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 216.853869][ T8897] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 04:11:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0xffffffffa0008000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d0000768621681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60", 0x2c}], 0x1}, 0x0) 04:11:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffff3) sendmsg(r1, &(0x7f0000001740)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x0, 0x0, 0x2, 0x0, {0xa, 0x4e22, 0xffffffffffffff33, @mcast2}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000440)="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", 0x1000}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000080)=@nfc={0x27, 0x0, 0x1, 0x6}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000140)="2b028cf609966f555b6be28f7f0408796c3db7caeb88cf4ea137c6ebb93746f571c3153cb28fbde84a88d89e3d54d6c27cf0a76cc6f0838de65a93ae15a9920fb2a9b1ddfe7babce0e59d946b1d470108de70e1655316dd7dbdcc4f91cd6b6284ee87e0dd5f51175778f6344ce6856a8005e797cc059a57d21a90b", 0x7b}], 0x1}, 0x400c0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r2 = socket$kcm(0x2, 0x3, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x381000, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)={[{0x2f, 'pids'}, {0x2f, 'rdma'}, {0x2d, 'cpu'}, {0x0, 'cpu'}, {0x0, 'cpu'}]}, 0x1b) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r6, &(0x7f0000000400), 0x0) openat$cgroup_ro(r4, &(0x7f0000000340)='cpuset.effective_mems\x00', 0x0, 0x0) sendmsg$kcm(r5, &(0x7f0000000400)={&(0x7f0000001440)=@rc={0x1f, {0x3, 0xe7, 0x5, 0x1, 0x2, 0x4}, 0x40}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001900)="27f9094f3b81e8bb7067446a42a134f3ee0e727eba35f0d49c430e172820bf7578764316bd0055abfc1b3d0b5b8fa27519010b50a402e1d72b69dc400cfa39effb684afba9bf06bbbeeabcee1c633cd42454b43429e57643f1246e96e71377a8092bae4d1bd673236c6b9caaf998847a440bfb37c0997c796b2d83014929a81fd24fbf26ab719d017d55eea22d9c5af4728ab03236c9e78670859ac73230bc20c73f9dbbe77cfc7963838b51b998db2479237d03489c57c54aa4975f7f1f917c1ecf1b79a1a6f0e40f8aed88b096c4043861ea59ba2778bd", 0xd8}], 0x1}, 0x10) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000040)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000800)={'caif0\x00', @broadcast}) close(r6) [ 217.281275][ T7] device bridge_slave_1 left promiscuous mode [ 217.288004][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.341266][ T7] device bridge_slave_0 left promiscuous mode [ 217.355307][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.073696][ T7] device hsr_slave_1 left promiscuous mode [ 219.124196][ T7] device hsr_slave_0 left promiscuous mode [ 219.196029][ T7] team0 (unregistering): Port device team_slave_1 removed [ 219.210010][ T7] team0 (unregistering): Port device team_slave_0 removed [ 219.223269][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 219.264759][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 219.365013][ T7] bond0 (unregistering): Released all slaves [ 219.497353][ T8921] IPVS: ftp: loaded support on port[0] = 21 [ 219.602571][ T8921] chnl_net:caif_netlink_parms(): no params data found [ 219.695910][ T8921] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.703431][ T8921] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.718298][ T8921] device bridge_slave_0 entered promiscuous mode [ 219.727394][ T8921] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.740852][ T8921] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.756220][ T8921] device bridge_slave_1 entered promiscuous mode [ 219.789452][ T8921] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.808386][ T8921] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.850496][ T8921] team0: Port device team_slave_0 added [ 219.858283][ T8921] team0: Port device team_slave_1 added [ 219.935781][ T8921] device hsr_slave_0 entered promiscuous mode [ 220.000666][ T8921] device hsr_slave_1 entered promiscuous mode [ 220.097524][ T8921] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.104706][ T8921] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.112228][ T8921] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.119829][ T8921] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.204128][ T8921] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.224941][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.243057][ T8656] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.252374][ T8656] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.275847][ T8921] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.289059][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.299939][ T3294] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.307888][ T3294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.336930][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.349188][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.357368][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.385122][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.411548][ T8921] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 220.423189][ T8921] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 220.440584][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.448869][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.458090][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.468086][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.479354][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 220.503010][ T8921] 8021q: adding VLAN 0 to HW filter on device batadv0 04:11:21 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x400, 0x8, 0x3, 0xfffffffffffffffb, 0x0, 0x20, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x3ff, 0x1778, 0x1, 0x0, 0x8, 0x80000, 0x0, 0x7, 0x0, 0x4, 0x7fff, 0xad, 0x9, 0x5e2, 0x1, 0x6, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x2}, 0x80, 0x6, 0x101, 0x7, 0xf4fd, 0x7a, 0xa932}, 0x0, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x6d000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) write$cgroup_subtree(r1, 0x0, 0x0) 04:11:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="2e00000015008100a00f80ecdb4cb904024865160b00d11468b26efb120003000800da1ba6bf19a9ffe200000000", 0x2e}], 0x1}, 0x0) 04:11:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="180000000000001749bcac0001000000ec00000004"], 0x15}, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) sendmsg$kcm(r0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) 04:11:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0xffffffffa0008000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d0000768621681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60", 0x2c}], 0x1}, 0x0) 04:11:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffff3) sendmsg(r1, &(0x7f0000001740)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x0, 0x0, 0x2, 0x0, {0xa, 0x4e22, 0xffffffffffffff33, @mcast2}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000440)="7dceef6b39d3e7fe6f9288ec3df19eab95430d6f67a563db2e4a5c78f9a1077e67e24983723e58313ffd8821a12fb04a68e31a586f4c83509eb7d4aec5d3d9f77d1f5a39329af95b1c00a9d32fd54ac5004970de60d88e6d747c01e8d20fed2b2d4209e33f2f53c7d33e93dfb5a47a4108278dea7936f3483c3c1b2453492baf6e319938a63827df7bb7d27821c2b0e006221a2b63e4bd589c1bc6ef39a798f88971e1a34d6d9e961fb958a16cff371827bff0b64ab6e30e0e8bbe8c4e1b56ff0fd3dcc038805e22a84c9b2d0574c115e58db77db739708ee3f7dc20f4339dd9903e13e52e08f8c694b725a895ef45b44592f5469264d16cf83bfdc99c6b4b545d5dcd8bff76ff3737da4c80cad7a43c35a987f2316cecd9e159243492150e16a86b182001076c693f23afcb6b71348d738c30abecf2308af2b93ddc9c4cca6949d80eb3d8c37b06bba2c1400582604afbf6572275537df273e1dc46b9d02ff1368f427e1d1abbd53f93e78f6e3abccdb92368873406f2141b4aba62576bf89a7502c0922b030d7bbcaf579aec9d5fae415c5753847ff02421739806a55eea9153b1e9a9842b3baf861a6f02c4cabc10865dd5290f3027fa248343f98fb7ffc836bcdebbc703731b21b973cb00349efec9f9d8de212c41dfaf2bfc9bc8a9c9557227a612617198377e10b493117ff61e37a6a426f01613088c26717b2ecf198af92dce524f5bc188bb74fb31118524edc345ba71252803751c3c91d9c4d2e73be23de931ff7b817c5f594cf958efe5f3841078770ca81963afee790ea4b77f8d9bac08e2f65dfb66629b3536264174a363b39fe23a454630c1681d3c9d489fdd18ea6291f65d52ec85fbce1a37587cc53543ffa92381f6e91f9b0ce03176b824b002a7dbc68c383212a36c5b9108b6607d8f5b30dfaf53ac33915e1c6ec595ddcd9b9589ed7dda0c24cb46c8dcf024eadac48f4a811299b02c88034212b2f5ea529040145862f7fb39b762f89e0af907efc4a658f2bb4bb0583cdec7142be40d3063327f17490cbc9782a41e5e7989cf778c520af61ec9355245ffed3ba977808f194af2948fac32c2e4c7de7b65e8404ae9e41809336ad01479004a4d678534c1a005f3f2844babc1b869964d86e8ccc999baa16b700964733c79402cf5c9753197f6a680056eae1bd5960efdea6bc41f91f29b46c7caf4a16065d2a27195d100303e9e593a7c7d0a0ee9e8144185d586a0dd93fde3373345a92f602f466e24304d6401b190ea360dce67775165032cb0e0ae93cef7172aeb4f8008a85b72ff398c4233f45ab50f4ff4d1649fce1090d324be0bdd6a704ded011100990ce25a7a1d43ad643de7d8441317727dce7faf0dbb18741a4b761345f31aba6497a56e0ab056d25c00370860afd6cb6474da256987b6b7fe076e2e303089497c480add816036d63632ce4f50c248c4b7f8b9fedd64425a23bb8ad0b605de57967a2e1ffd29a4ac1c7c4e8b898744017eec664f2e9a7f27203463fad7be53323f16db5af46fac1c1204a7877527cf8ac02213011cd6bde6bd940dfad48d50c4dd167464f1ede442f7074f85699d927657c65f5917bba164c75caf99ba9be7aebbfb7d681270d1dc0f7e5f968d92a287501439f334a8c571a9caf49a2486dd0b2ed0f39ed9b8c2a4f0c95d79c52186a6491cffd5b3d86e7c783a8a77786c316eac3fab287b35b5b4682f57f649bc1c485815d1179e79c7662e5b26067450f448e836f22fb2b496df01537d88b6b24facc31af723fd65e13681b0ac6a99becc4490fa51a7c1ff11a435d91492f977f96539a032e5a210abb8e9cfe2fad753055a76ade20b8f1e789bbc1bb7c48819fe7c628f821ee3a3819767682da7c8684e592d63f996b2601997712cf1fb7d7bdcb2abc9e653e74679a33adb39facc74150b3438a2a21a67c952766ac7d0df9c6bcc29c657be4ed606ed7561d763ff6ae8dfdedcfa20fa1dae94e81208715123313534a3c84601cc113d4d18e3d3d206d3cf7d19896b8a2a4f467617780f6fba94daf59a95122fcc54086cbabeffda2bf32817dfee0005f277c7b7f4b89586615445af321432c859c9b3989f639da0781c4b8ec73a0265027a78f7199133d5dbc746aeeb62a310604865d6187d69d836baf708351a31af4099d59037bffb5f6a226c13a08b25cc7f0aef0ea62701940a7792721cfbac02e5bd10f5d0a7270eefc58229f65cf0c6a89393e6332efcb7a2d4631307fd8cce3a76de979e708d569f33b2cd0789621e6918189edf5b212b06c458fab6a767b41d1dafd6092b89bd1539cd04ed3780075dc1ec0d013b7dd6bdf3014658e554e7f3822269c4ed61eb446b67cb442c28bb7944cec84b0ddf2fa556714c10fdbdb6aee92441f5a058fba29193f1901aa54248110dda84124d9cc07e72f16aff8700130e4b10bc40279c6ca14bef773906bba7563e23668d72306e100f412d9a27a29a36d831f736f03043006d60c8ba6eab2b732443ebb3b6bab2e7f617a1893c5bd204382f3392438b5edd0414070bce091dbd12101bae386890d8cfabbec9065a8134731f669c70bdb053d0a843339926ca4cec6b1bd71c770337adb81c260ea55d8794e664bce5af074f977d0b2afbf2b070f78e4409094c23e4c4ad1fae4a61300d4df2b2725499246cfef92c9c4a785fd5067fb90302ddc26faf7ae6f9c69e7ff87d07c4c5c396d4395590c876c9f8698aea8b966bb5ca399d98cac5dbde89d510b5fbb9478b5a0c57013b3363e504305223ff7bef6dcd10aec6cb9433350d0c9a8877a154f1e9088ca83949284d5d060084ace8203f91844c7f28ea9833236a3b3e512bd8df9662a344b30a749cf4b4d783f115ca09f703127e86ea344599fb71ea3cbcfa23704e8ddd91acb4b908b0db71f3ed326c6e7f87f5e3030711c080e57407c9b0359abcd68801c0f0915f2435cc1382043ce9dafce198e246999ca1424405fd4facf83f49e6981bbf366eedc25dad64ce941c69fe57cd983cd93b8b85012e4e3f68736f8ff76538447aca6c1f1cf419b4065f10b7de1af5d99f30366fcad727e012f1a24598a6d7d6c06f3113dfb136c17d666a384c5c8d5545036e472289fb24c254fdec6b9f5327fa48a2edaf9456db72921f6551b8e39b170221e0282c2a05ad8206deb2b303143b92cef8a889b21f2aaedd09d3001e9e1041df296a489a4a0b83fdeb17c4541353ad6739048a5e0a0885edd4f055b1c72a4addd81978916dc5ac8996040ea190778dab084c6e4e0997e3efc17e479033b4cd16fbeb2d3415cfd910ca766c1c09c3b816bf08db953ce1a3aacc18b69ce7932c95fd67c44973347fe9475daa5351f1c410c5852fb8b30a5fdf35608722571b087326f29040a759f3f96d125ed86645f7f89d961ddd86a7f84c3e3bb52e3e9ffcffe03f83908972b7b2e160224e8eff697d22dae6ae4357152950feb4cce57b1ef6c6f9436d1b7084b502b558878847f57466d667920470e538c1998a4e9e892a56f0e06207ab7497fe1e5e7e542d1376d8285fe1302de270f1b65999adcab2bb8b4c006d4f76b6ffe832999b77e89679cbcab401b34f14442195b6dca0339d28bd1d34bdd1ea6514dcef1024b896cb5b9d01d89568fe3bd65b4f629842d79d8328337feec240f39f7098fac870de90bace9ba8d34d74a7532590f26005502c2df4551034b374d34447ef7f222a38db480419ef7c8e536b379268ce47de99ebec36fa01412adb2358ecbcc70c3bdc5fcbe3e41adfc3ac16d87aee511666e927c6dc6ca55fce122064cfd440fba6c09ec431cbf3c287cd724db4947a4268e72ba0acc127d7365b3b975e0fe81973025468e153735d120137da820dcf4e9461c4d37b769424a7fb77e0753026d2cfc969f64a72e4f9170d0b854edd395357f35d49e6a30086c1421f85b5895c306f6e39e4ce6bfd362fccdd2037358f27f0bceb05c1ee53af2675a411318d350a049a7b3f166db28b99447c84792ea7f3bfd099ed3bc52e039a158141b50e0365ad7d6a6b7cd1bd320dedefd0a943981966801f70e439e3421d59f7a43f3d54477359fd9466f8df6f3fbbf9c019384430ea5583b9211d9180ea54fff4cd967670d8552796f58269504bc1bf131a6b04573fefa976c6cf114ef5928627a2f05b6e1f29a23d85e5473a9cb0b6ca31e78adce33aec34c1998f3d35bb4d5c94113ecd9459ab3c6631f0e08a40bb1bccbe970b708e0bc78fd3e4b3056bf53148956ba8b5da58bc71119372aa4ff3c41eb1e655106ec668d689f5758389c5bd67afff87e2575dda6cc089afca195749d5b33e2916eb8c2faac7ae6a51a0509223ed8d16b038b1606b9755e5b4975bddd3cb1884a88ec4d12ff7d0b9370ddb7aa2d8adfc21d34772169ba65e317d8572f80ea7b02f6038f5b77c3e0da8c4edd70242df1001fdfaeb3a993b9791319e1939f51af47a1082bbb29bb6b159a5d0d6af295cfdc7b6b020bafab3f97f252b5b43302fb94876d84fca74712c903e612fab14347436d0aa78116fa25fc29ce6abb7955160bf4c569693961afbae6ff4fdb9b009b515bf82f14db0151e90a0f2dfc463591c667f46e23767731abbae99a8d893cbd3e7d05aeeaca9b3a7601c436f1f9aacd291dca0342916716185cbb3c3995fac8c15af32f833ca4b7d42f6d67952e1f1676f0ef8099c9498c00a06b0b658beccb12b6b546d831e25c06c897ad3a0f23c2177740b2dd600bbfde02c77d10df99de74d11840f4414f0e7c742932a57db2c05f07f1d2d15162267a150023afc543f171f69440760b4b36dd986e4250c926ad0cced02bbda8d49610c3643cfa76fff1e8ff650992964274ff5d5294a05571d1ccd60a3ece5e8fd4d0f0067e0694796dc37b2e1542088a77f197f0e0a73442e9af556408fb1f4b1c0b8ba4025e80bddc5babce0bd8f730559b6a8300e35fee1f40a9978a40fde31ff739095c0753bd431728d153b65a0b7bedc7bc1b313ddeb0ac2914621bdbdf8a83ae643e6607b09cbfb341a261a70500d113b96e4aa243c90c702e3f491c307813890526b8a90ae86c11b4a5e3a8c742300c6227d74f0c93d403632e34167d12b2c61bac3690b9af1fcd0307c3f6972664cd4f09682f34eae5613795b993a8974718c00fad957630f5c4d5a89ed9fc5ed80f999d7ee3a7d5602ab98efcf0f1f050e2a19071399a81a087e4d6d523073fdf86813169abff3a8ad53c87f90f91e5e5dd050cc23b2543eef14d2ba878c472eca94735fef10f8c63c70a899d15f9550430756104d52542f97ef417a28ec8c43f156d47a1b020057d63c78935845245ffe877edf3792fba9aabbb9329ec2d8b1259eecd8f1a4f51ca74bdde0b0d6cc48fd3eaa6cc8475122da6d095890601cba442092fb7cb2dbc81752caadbc346bfe7d06384f95b4d9514f4af431a5a6e198222a6f17cfe4ad150507fd82c5aea730d19a6efa1140c3b10e9a25de8df40f324870d1da5d15de2ccd9d055992b0cbf732009789f52e80645d880bad25e4b7cc6a480552dccbbed21d5456f61d865fd0f331aff295bbeca9c157191b0df5d08b8e89feb9fa4fbb208e13ab236d0e2d54297039210f37a740b931630c9481e1e5a1f1fba8a84fb744be0c41e8d0aaf3e87fcdcf70b42e28172f8177084e84cc6fd6282d63a3b722201c99aa1b08714e987935257be91b218f4e26d5a1f78095193428d2833755aec9094ea79f1b9c0fe7b18c7f552087812dce89a0fd685756e6c70b481db0f6e247781bfc", 0x1000}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000080)=@nfc={0x27, 0x0, 0x1, 0x6}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000140)="2b028cf609966f555b6be28f7f0408796c3db7caeb88cf4ea137c6ebb93746f571c3153cb28fbde84a88d89e3d54d6c27cf0a76cc6f0838de65a93ae15a9920fb2a9b1ddfe7babce0e59d946b1d470108de70e1655316dd7dbdcc4f91cd6b6284ee87e0dd5f51175778f6344ce6856a8005e797cc059a57d21a90b", 0x7b}], 0x1}, 0x400c0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r2 = socket$kcm(0x2, 0x3, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x381000, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)={[{0x2f, 'pids'}, {0x2f, 'rdma'}, {0x2d, 'cpu'}, {0x0, 'cpu'}, {0x0, 'cpu'}]}, 0x1b) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r6, &(0x7f0000000400), 0x0) openat$cgroup_ro(r4, &(0x7f0000000340)='cpuset.effective_mems\x00', 0x0, 0x0) sendmsg$kcm(r5, &(0x7f0000000400)={&(0x7f0000001440)=@rc={0x1f, {0x3, 0xe7, 0x5, 0x1, 0x2, 0x4}, 0x40}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001900)="27f9094f3b81e8bb7067446a42a134f3ee0e727eba35f0d49c430e172820bf7578764316bd0055abfc1b3d0b5b8fa27519010b50a402e1d72b69dc400cfa39effb684afba9bf06bbbeeabcee1c633cd42454b43429e57643f1246e96e71377a8092bae4d1bd673236c6b9caaf998847a440bfb37c0997c796b2d83014929a81fd24fbf26ab719d017d55eea22d9c5af4728ab03236c9e78670859ac73230bc20c73f9dbbe77cfc7963838b51b998db2479237d03489c57c54aa4975f7f1f917c1ecf1b79a1a6f0e40f8aed88b096c4043861ea59ba2778bd", 0xd8}], 0x1}, 0x10) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000040)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000800)={'caif0\x00', @broadcast}) close(r6) 04:11:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffff3) sendmsg(r1, &(0x7f0000001740)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x0, 0x0, 0x2, 0x0, {0xa, 0x4e22, 0xffffffffffffff33, @mcast2}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000440)="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", 0x1000}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000080)=@nfc={0x27, 0x0, 0x1, 0x6}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000140)="2b028cf609966f555b6be28f7f0408796c3db7caeb88cf4ea137c6ebb93746f571c3153cb28fbde84a88d89e3d54d6c27cf0a76cc6f0838de65a93ae15a9920fb2a9b1ddfe7babce0e59d946b1d470108de70e1655316dd7dbdcc4f91cd6b6284ee87e0dd5f51175778f6344ce6856a8005e797cc059a57d21a90b", 0x7b}], 0x1}, 0x400c0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r2 = socket$kcm(0x2, 0x3, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x381000, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)={[{0x2f, 'pids'}, {0x2f, 'rdma'}, {0x2d, 'cpu'}, {0x0, 'cpu'}, {0x0, 'cpu'}]}, 0x1b) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r6, &(0x7f0000000400), 0x0) openat$cgroup_ro(r4, &(0x7f0000000340)='cpuset.effective_mems\x00', 0x0, 0x0) sendmsg$kcm(r5, &(0x7f0000000400)={&(0x7f0000001440)=@rc={0x1f, {0x3, 0xe7, 0x5, 0x1, 0x2, 0x4}, 0x40}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001900)="27f9094f3b81e8bb7067446a42a134f3ee0e727eba35f0d49c430e172820bf7578764316bd0055abfc1b3d0b5b8fa27519010b50a402e1d72b69dc400cfa39effb684afba9bf06bbbeeabcee1c633cd42454b43429e57643f1246e96e71377a8092bae4d1bd673236c6b9caaf998847a440bfb37c0997c796b2d83014929a81fd24fbf26ab719d017d55eea22d9c5af4728ab03236c9e78670859ac73230bc20c73f9dbbe77cfc7963838b51b998db2479237d03489c57c54aa4975f7f1f917c1ecf1b79a1a6f0e40f8aed88b096c4043861ea59ba2778bd", 0xd8}], 0x1}, 0x10) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000040)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000800)={'caif0\x00', @broadcast}) close(r6) [ 220.783878][ T8938] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 04:11:21 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x802, 0x88) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) sendmsg$kcm(r1, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r1, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 04:11:21 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x16}]}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f00000001c0)) 04:11:21 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2, 0x1, 0x84) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x4000000000000000, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 04:11:22 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x400, 0x8, 0x3, 0xfffffffffffffffb, 0x0, 0x20, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x3ff, 0x1778, 0x1, 0x0, 0x8, 0x80000, 0x0, 0x7, 0x0, 0x4, 0x7fff, 0xad, 0x9, 0x5e2, 0x1, 0x6, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x2}, 0x80, 0x6, 0x101, 0x7, 0xf4fd, 0x7a, 0xa932}, 0x0, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x6d000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) write$cgroup_subtree(r1, 0x0, 0x0) 04:11:22 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffff3) sendmsg(r1, &(0x7f0000001740)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x0, 0x0, 0x2, 0x0, {0xa, 0x4e22, 0xffffffffffffff33, @mcast2}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000440)="7dceef6b39d3e7fe6f9288ec3df19eab95430d6f67a563db2e4a5c78f9a1077e67e24983723e58313ffd8821a12fb04a68e31a586f4c83509eb7d4aec5d3d9f77d1f5a39329af95b1c00a9d32fd54ac5004970de60d88e6d747c01e8d20fed2b2d4209e33f2f53c7d33e93dfb5a47a4108278dea7936f3483c3c1b2453492baf6e319938a63827df7bb7d27821c2b0e006221a2b63e4bd589c1bc6ef39a798f88971e1a34d6d9e961fb958a16cff371827bff0b64ab6e30e0e8bbe8c4e1b56ff0fd3dcc038805e22a84c9b2d0574c115e58db77db739708ee3f7dc20f4339dd9903e13e52e08f8c694b725a895ef45b44592f5469264d16cf83bfdc99c6b4b545d5dcd8bff76ff3737da4c80cad7a43c35a987f2316cecd9e159243492150e16a86b182001076c693f23afcb6b71348d738c30abecf2308af2b93ddc9c4cca6949d80eb3d8c37b06bba2c1400582604afbf6572275537df273e1dc46b9d02ff1368f427e1d1abbd53f93e78f6e3abccdb92368873406f2141b4aba62576bf89a7502c0922b030d7bbcaf579aec9d5fae415c5753847ff02421739806a55eea9153b1e9a9842b3baf861a6f02c4cabc10865dd5290f3027fa248343f98fb7ffc836bcdebbc703731b21b973cb00349efec9f9d8de212c41dfaf2bfc9bc8a9c9557227a612617198377e10b493117ff61e37a6a426f01613088c26717b2ecf198af92dce524f5bc188bb74fb31118524edc345ba71252803751c3c91d9c4d2e73be23de931ff7b817c5f594cf958efe5f3841078770ca81963afee790ea4b77f8d9bac08e2f65dfb66629b3536264174a363b39fe23a454630c1681d3c9d489fdd18ea6291f65d52ec85fbce1a37587cc53543ffa92381f6e91f9b0ce03176b824b002a7dbc68c383212a36c5b9108b6607d8f5b30dfaf53ac33915e1c6ec595ddcd9b9589ed7dda0c24cb46c8dcf024eadac48f4a811299b02c88034212b2f5ea529040145862f7fb39b762f89e0af907efc4a658f2bb4bb0583cdec7142be40d3063327f17490cbc9782a41e5e7989cf778c520af61ec9355245ffed3ba977808f194af2948fac32c2e4c7de7b65e8404ae9e41809336ad01479004a4d678534c1a005f3f2844babc1b869964d86e8ccc999baa16b700964733c79402cf5c9753197f6a680056eae1bd5960efdea6bc41f91f29b46c7caf4a16065d2a27195d100303e9e593a7c7d0a0ee9e8144185d586a0dd93fde3373345a92f602f466e24304d6401b190ea360dce67775165032cb0e0ae93cef7172aeb4f8008a85b72ff398c4233f45ab50f4ff4d1649fce1090d324be0bdd6a704ded011100990ce25a7a1d43ad643de7d8441317727dce7faf0dbb18741a4b761345f31aba6497a56e0ab056d25c00370860afd6cb6474da256987b6b7fe076e2e303089497c480add816036d63632ce4f50c248c4b7f8b9fedd64425a23bb8ad0b605de57967a2e1ffd29a4ac1c7c4e8b898744017eec664f2e9a7f27203463fad7be53323f16db5af46fac1c1204a7877527cf8ac02213011cd6bde6bd940dfad48d50c4dd167464f1ede442f7074f85699d927657c65f5917bba164c75caf99ba9be7aebbfb7d681270d1dc0f7e5f968d92a287501439f334a8c571a9caf49a2486dd0b2ed0f39ed9b8c2a4f0c95d79c52186a6491cffd5b3d86e7c783a8a77786c316eac3fab287b35b5b4682f57f649bc1c485815d1179e79c7662e5b26067450f448e836f22fb2b496df01537d88b6b24facc31af723fd65e13681b0ac6a99becc4490fa51a7c1ff11a435d91492f977f96539a032e5a210abb8e9cfe2fad753055a76ade20b8f1e789bbc1bb7c48819fe7c628f821ee3a3819767682da7c8684e592d63f996b2601997712cf1fb7d7bdcb2abc9e653e74679a33adb39facc74150b3438a2a21a67c952766ac7d0df9c6bcc29c657be4ed606ed7561d763ff6ae8dfdedcfa20fa1dae94e81208715123313534a3c84601cc113d4d18e3d3d206d3cf7d19896b8a2a4f467617780f6fba94daf59a95122fcc54086cbabeffda2bf32817dfee0005f277c7b7f4b89586615445af321432c859c9b3989f639da0781c4b8ec73a0265027a78f7199133d5dbc746aeeb62a310604865d6187d69d836baf708351a31af4099d59037bffb5f6a226c13a08b25cc7f0aef0ea62701940a7792721cfbac02e5bd10f5d0a7270eefc58229f65cf0c6a89393e6332efcb7a2d4631307fd8cce3a76de979e708d569f33b2cd0789621e6918189edf5b212b06c458fab6a767b41d1dafd6092b89bd1539cd04ed3780075dc1ec0d013b7dd6bdf3014658e554e7f3822269c4ed61eb446b67cb442c28bb7944cec84b0ddf2fa556714c10fdbdb6aee92441f5a058fba29193f1901aa54248110dda84124d9cc07e72f16aff8700130e4b10bc40279c6ca14bef773906bba7563e23668d72306e100f412d9a27a29a36d831f736f03043006d60c8ba6eab2b732443ebb3b6bab2e7f617a1893c5bd204382f3392438b5edd0414070bce091dbd12101bae386890d8cfabbec9065a8134731f669c70bdb053d0a843339926ca4cec6b1bd71c770337adb81c260ea55d8794e664bce5af074f977d0b2afbf2b070f78e4409094c23e4c4ad1fae4a61300d4df2b2725499246cfef92c9c4a785fd5067fb90302ddc26faf7ae6f9c69e7ff87d07c4c5c396d4395590c876c9f8698aea8b966bb5ca399d98cac5dbde89d510b5fbb9478b5a0c57013b3363e504305223ff7bef6dcd10aec6cb9433350d0c9a8877a154f1e9088ca83949284d5d060084ace8203f91844c7f28ea9833236a3b3e512bd8df9662a344b30a749cf4b4d783f115ca09f703127e86ea344599fb71ea3cbcfa23704e8ddd91acb4b908b0db71f3ed326c6e7f87f5e3030711c080e57407c9b0359abcd68801c0f0915f2435cc1382043ce9dafce198e246999ca1424405fd4facf83f49e6981bbf366eedc25dad64ce941c69fe57cd983cd93b8b85012e4e3f68736f8ff76538447aca6c1f1cf419b4065f10b7de1af5d99f30366fcad727e012f1a24598a6d7d6c06f3113dfb136c17d666a384c5c8d5545036e472289fb24c254fdec6b9f5327fa48a2edaf9456db72921f6551b8e39b170221e0282c2a05ad8206deb2b303143b92cef8a889b21f2aaedd09d3001e9e1041df296a489a4a0b83fdeb17c4541353ad6739048a5e0a0885edd4f055b1c72a4addd81978916dc5ac8996040ea190778dab084c6e4e0997e3efc17e479033b4cd16fbeb2d3415cfd910ca766c1c09c3b816bf08db953ce1a3aacc18b69ce7932c95fd67c44973347fe9475daa5351f1c410c5852fb8b30a5fdf35608722571b087326f29040a759f3f96d125ed86645f7f89d961ddd86a7f84c3e3bb52e3e9ffcffe03f83908972b7b2e160224e8eff697d22dae6ae4357152950feb4cce57b1ef6c6f9436d1b7084b502b558878847f57466d667920470e538c1998a4e9e892a56f0e06207ab7497fe1e5e7e542d1376d8285fe1302de270f1b65999adcab2bb8b4c006d4f76b6ffe832999b77e89679cbcab401b34f14442195b6dca0339d28bd1d34bdd1ea6514dcef1024b896cb5b9d01d89568fe3bd65b4f629842d79d8328337feec240f39f7098fac870de90bace9ba8d34d74a7532590f26005502c2df4551034b374d34447ef7f222a38db480419ef7c8e536b379268ce47de99ebec36fa01412adb2358ecbcc70c3bdc5fcbe3e41adfc3ac16d87aee511666e927c6dc6ca55fce122064cfd440fba6c09ec431cbf3c287cd724db4947a4268e72ba0acc127d7365b3b975e0fe81973025468e153735d120137da820dcf4e9461c4d37b769424a7fb77e0753026d2cfc969f64a72e4f9170d0b854edd395357f35d49e6a30086c1421f85b5895c306f6e39e4ce6bfd362fccdd2037358f27f0bceb05c1ee53af2675a411318d350a049a7b3f166db28b99447c84792ea7f3bfd099ed3bc52e039a158141b50e0365ad7d6a6b7cd1bd320dedefd0a943981966801f70e439e3421d59f7a43f3d54477359fd9466f8df6f3fbbf9c019384430ea5583b9211d9180ea54fff4cd967670d8552796f58269504bc1bf131a6b04573fefa976c6cf114ef5928627a2f05b6e1f29a23d85e5473a9cb0b6ca31e78adce33aec34c1998f3d35bb4d5c94113ecd9459ab3c6631f0e08a40bb1bccbe970b708e0bc78fd3e4b3056bf53148956ba8b5da58bc71119372aa4ff3c41eb1e655106ec668d689f5758389c5bd67afff87e2575dda6cc089afca195749d5b33e2916eb8c2faac7ae6a51a0509223ed8d16b038b1606b9755e5b4975bddd3cb1884a88ec4d12ff7d0b9370ddb7aa2d8adfc21d34772169ba65e317d8572f80ea7b02f6038f5b77c3e0da8c4edd70242df1001fdfaeb3a993b9791319e1939f51af47a1082bbb29bb6b159a5d0d6af295cfdc7b6b020bafab3f97f252b5b43302fb94876d84fca74712c903e612fab14347436d0aa78116fa25fc29ce6abb7955160bf4c569693961afbae6ff4fdb9b009b515bf82f14db0151e90a0f2dfc463591c667f46e23767731abbae99a8d893cbd3e7d05aeeaca9b3a7601c436f1f9aacd291dca0342916716185cbb3c3995fac8c15af32f833ca4b7d42f6d67952e1f1676f0ef8099c9498c00a06b0b658beccb12b6b546d831e25c06c897ad3a0f23c2177740b2dd600bbfde02c77d10df99de74d11840f4414f0e7c742932a57db2c05f07f1d2d15162267a150023afc543f171f69440760b4b36dd986e4250c926ad0cced02bbda8d49610c3643cfa76fff1e8ff650992964274ff5d5294a05571d1ccd60a3ece5e8fd4d0f0067e0694796dc37b2e1542088a77f197f0e0a73442e9af556408fb1f4b1c0b8ba4025e80bddc5babce0bd8f730559b6a8300e35fee1f40a9978a40fde31ff739095c0753bd431728d153b65a0b7bedc7bc1b313ddeb0ac2914621bdbdf8a83ae643e6607b09cbfb341a261a70500d113b96e4aa243c90c702e3f491c307813890526b8a90ae86c11b4a5e3a8c742300c6227d74f0c93d403632e34167d12b2c61bac3690b9af1fcd0307c3f6972664cd4f09682f34eae5613795b993a8974718c00fad957630f5c4d5a89ed9fc5ed80f999d7ee3a7d5602ab98efcf0f1f050e2a19071399a81a087e4d6d523073fdf86813169abff3a8ad53c87f90f91e5e5dd050cc23b2543eef14d2ba878c472eca94735fef10f8c63c70a899d15f9550430756104d52542f97ef417a28ec8c43f156d47a1b020057d63c78935845245ffe877edf3792fba9aabbb9329ec2d8b1259eecd8f1a4f51ca74bdde0b0d6cc48fd3eaa6cc8475122da6d095890601cba442092fb7cb2dbc81752caadbc346bfe7d06384f95b4d9514f4af431a5a6e198222a6f17cfe4ad150507fd82c5aea730d19a6efa1140c3b10e9a25de8df40f324870d1da5d15de2ccd9d055992b0cbf732009789f52e80645d880bad25e4b7cc6a480552dccbbed21d5456f61d865fd0f331aff295bbeca9c157191b0df5d08b8e89feb9fa4fbb208e13ab236d0e2d54297039210f37a740b931630c9481e1e5a1f1fba8a84fb744be0c41e8d0aaf3e87fcdcf70b42e28172f8177084e84cc6fd6282d63a3b722201c99aa1b08714e987935257be91b218f4e26d5a1f78095193428d2833755aec9094ea79f1b9c0fe7b18c7f552087812dce89a0fd685756e6c70b481db0f6e247781bfc", 0x1000}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000080)=@nfc={0x27, 0x0, 0x1, 0x6}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000140)="2b028cf609966f555b6be28f7f0408796c3db7caeb88cf4ea137c6ebb93746f571c3153cb28fbde84a88d89e3d54d6c27cf0a76cc6f0838de65a93ae15a9920fb2a9b1ddfe7babce0e59d946b1d470108de70e1655316dd7dbdcc4f91cd6b6284ee87e0dd5f51175778f6344ce6856a8005e797cc059a57d21a90b", 0x7b}], 0x1}, 0x400c0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r2 = socket$kcm(0x2, 0x3, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x381000, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)={[{0x2f, 'pids'}, {0x2f, 'rdma'}, {0x2d, 'cpu'}, {0x0, 'cpu'}, {0x0, 'cpu'}]}, 0x1b) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r6, &(0x7f0000000400), 0x0) openat$cgroup_ro(r4, &(0x7f0000000340)='cpuset.effective_mems\x00', 0x0, 0x0) sendmsg$kcm(r5, &(0x7f0000000400)={&(0x7f0000001440)=@rc={0x1f, {0x3, 0xe7, 0x5, 0x1, 0x2, 0x4}, 0x40}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001900)="27f9094f3b81e8bb7067446a42a134f3ee0e727eba35f0d49c430e172820bf7578764316bd0055abfc1b3d0b5b8fa27519010b50a402e1d72b69dc400cfa39effb684afba9bf06bbbeeabcee1c633cd42454b43429e57643f1246e96e71377a8092bae4d1bd673236c6b9caaf998847a440bfb37c0997c796b2d83014929a81fd24fbf26ab719d017d55eea22d9c5af4728ab03236c9e78670859ac73230bc20c73f9dbbe77cfc7963838b51b998db2479237d03489c57c54aa4975f7f1f917c1ecf1b79a1a6f0e40f8aed88b096c4043861ea59ba2778bd", 0xd8}], 0x1}, 0x10) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000040)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000800)={'caif0\x00', @broadcast}) close(r6) 04:11:22 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x802, 0x88) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) sendmsg$kcm(r1, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r1, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 04:11:22 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x802, 0x88) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) sendmsg$kcm(r1, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r1, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 04:11:22 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x119) 04:11:22 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000280)=""/240, 0xfc7b}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x59c9, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x0, 0x0, 0x4000]}, 0x14}, 0x80, &(0x7f0000000340), 0x16, &(0x7f0000000180)}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) 04:11:22 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x802, 0x88) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) sendmsg$kcm(r1, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r1, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 221.755748][ T8976] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 222.531373][ T8988] IPVS: ftp: loaded support on port[0] = 21 [ 222.710668][ T8988] chnl_net:caif_netlink_parms(): no params data found [ 222.797607][ T8988] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.806199][ T8988] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.814425][ T8988] device bridge_slave_0 entered promiscuous mode [ 222.822692][ T8988] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.830572][ T8988] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.838619][ T8988] device bridge_slave_1 entered promiscuous mode [ 222.913717][ T8988] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 222.925475][ T8988] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 222.946207][ T8988] team0: Port device team_slave_0 added [ 222.954284][ T8988] team0: Port device team_slave_1 added [ 223.073197][ T8988] device hsr_slave_0 entered promiscuous mode [ 223.120550][ T8988] device hsr_slave_1 entered promiscuous mode [ 223.171287][ T7] device bridge_slave_1 left promiscuous mode [ 223.177716][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.212567][ T7] device bridge_slave_0 left promiscuous mode [ 223.218933][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.825502][ T7] device hsr_slave_1 left promiscuous mode [ 224.893741][ T7] device hsr_slave_0 left promiscuous mode [ 224.954984][ T7] team0 (unregistering): Port device team_slave_1 removed [ 224.969405][ T7] team0 (unregistering): Port device team_slave_0 removed [ 224.981753][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 225.046270][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 225.140217][ T7] bond0 (unregistering): Released all slaves [ 225.249167][ T8988] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.256475][ T8988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.264409][ T8988] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.272537][ T8988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.281556][ T8656] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.289714][ T8656] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.325992][ T8988] 8021q: adding VLAN 0 to HW filter on device bond0 [ 225.339666][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.351588][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.364536][ T8988] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.378393][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.387329][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.396803][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.408848][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.418329][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.427149][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.435946][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.443067][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.513325][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 225.522591][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.531777][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.543357][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.552691][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 225.562320][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.571733][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 225.586532][ T8988] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 225.598247][ T8988] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 225.612954][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 225.621988][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 225.631387][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 225.640801][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 225.662724][ T8988] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 225.680035][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 225.940959][ T8996] device caif0 entered promiscuous mode 04:11:26 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffff3) sendmsg(r1, &(0x7f0000001740)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x0, 0x0, 0x2, 0x0, {0xa, 0x4e22, 0xffffffffffffff33, @mcast2}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000440)="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", 0x1000}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000080)=@nfc={0x27, 0x0, 0x1, 0x6}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000140)="2b028cf609966f555b6be28f7f0408796c3db7caeb88cf4ea137c6ebb93746f571c3153cb28fbde84a88d89e3d54d6c27cf0a76cc6f0838de65a93ae15a9920fb2a9b1ddfe7babce0e59d946b1d470108de70e1655316dd7dbdcc4f91cd6b6284ee87e0dd5f51175778f6344ce6856a8005e797cc059a57d21a90b", 0x7b}], 0x1}, 0x400c0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r2 = socket$kcm(0x2, 0x3, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x381000, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)={[{0x2f, 'pids'}, {0x2f, 'rdma'}, {0x2d, 'cpu'}, {0x0, 'cpu'}, {0x0, 'cpu'}]}, 0x1b) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r6, &(0x7f0000000400), 0x0) openat$cgroup_ro(r4, &(0x7f0000000340)='cpuset.effective_mems\x00', 0x0, 0x0) sendmsg$kcm(r5, &(0x7f0000000400)={&(0x7f0000001440)=@rc={0x1f, {0x3, 0xe7, 0x5, 0x1, 0x2, 0x4}, 0x40}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001900)="27f9094f3b81e8bb7067446a42a134f3ee0e727eba35f0d49c430e172820bf7578764316bd0055abfc1b3d0b5b8fa27519010b50a402e1d72b69dc400cfa39effb684afba9bf06bbbeeabcee1c633cd42454b43429e57643f1246e96e71377a8092bae4d1bd673236c6b9caaf998847a440bfb37c0997c796b2d83014929a81fd24fbf26ab719d017d55eea22d9c5af4728ab03236c9e78670859ac73230bc20c73f9dbbe77cfc7963838b51b998db2479237d03489c57c54aa4975f7f1f917c1ecf1b79a1a6f0e40f8aed88b096c4043861ea59ba2778bd", 0xd8}], 0x1}, 0x10) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000040)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000800)={'caif0\x00', @broadcast}) close(r6) 04:11:26 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000240)="9e43010000800000000100e4ac141411eb", 0x11}], 0x1}, 0x0) 04:11:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$MAP_CREATE(0xe, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x400, 0x0}, 0x3c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x11f}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 04:11:26 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x802, 0x88) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) sendmsg$kcm(r1, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r1, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 04:11:26 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000280)=""/240, 0xfc7b}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x59c9, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x0, 0x0, 0x4000]}, 0x14}, 0x80, &(0x7f0000000340), 0x16, &(0x7f0000000180)}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) 04:11:26 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x802, 0x88) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) sendmsg$kcm(r1, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r1, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 04:11:27 executing program 1: r0 = socket$kcm(0x10, 0x400000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="23000000190081ae08060c04000f00000a687f03fe0200018701546fabca1b4e7d06a6", 0x23}], 0x1}, 0x0) 04:11:27 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000280)=""/240, 0xfc7b}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x59c9, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x0, 0x0, 0x4000]}, 0x14}, 0x80, &(0x7f0000000340), 0x16, &(0x7f0000000180)}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) 04:11:27 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x802, 0x88) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) sendmsg$kcm(r1, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r1, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 04:11:27 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x2f, 'rdma'}]}, 0xc) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 226.389052][ T9008] device nr0 entered promiscuous mode [ 226.462225][ T9018] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.1'. 04:11:27 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffff3) sendmsg(r1, &(0x7f0000001740)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x0, 0x0, 0x2, 0x0, {0xa, 0x4e22, 0xffffffffffffff33, @mcast2}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000440)="7dceef6b39d3e7fe6f9288ec3df19eab95430d6f67a563db2e4a5c78f9a1077e67e24983723e58313ffd8821a12fb04a68e31a586f4c83509eb7d4aec5d3d9f77d1f5a39329af95b1c00a9d32fd54ac5004970de60d88e6d747c01e8d20fed2b2d4209e33f2f53c7d33e93dfb5a47a4108278dea7936f3483c3c1b2453492baf6e319938a63827df7bb7d27821c2b0e006221a2b63e4bd589c1bc6ef39a798f88971e1a34d6d9e961fb958a16cff371827bff0b64ab6e30e0e8bbe8c4e1b56ff0fd3dcc038805e22a84c9b2d0574c115e58db77db739708ee3f7dc20f4339dd9903e13e52e08f8c694b725a895ef45b44592f5469264d16cf83bfdc99c6b4b545d5dcd8bff76ff3737da4c80cad7a43c35a987f2316cecd9e159243492150e16a86b182001076c693f23afcb6b71348d738c30abecf2308af2b93ddc9c4cca6949d80eb3d8c37b06bba2c1400582604afbf6572275537df273e1dc46b9d02ff1368f427e1d1abbd53f93e78f6e3abccdb92368873406f2141b4aba62576bf89a7502c0922b030d7bbcaf579aec9d5fae415c5753847ff02421739806a55eea9153b1e9a9842b3baf861a6f02c4cabc10865dd5290f3027fa248343f98fb7ffc836bcdebbc703731b21b973cb00349efec9f9d8de212c41dfaf2bfc9bc8a9c9557227a612617198377e10b493117ff61e37a6a426f01613088c26717b2ecf198af92dce524f5bc188bb74fb31118524edc345ba71252803751c3c91d9c4d2e73be23de931ff7b817c5f594cf958efe5f3841078770ca81963afee790ea4b77f8d9bac08e2f65dfb66629b3536264174a363b39fe23a454630c1681d3c9d489fdd18ea6291f65d52ec85fbce1a37587cc53543ffa92381f6e91f9b0ce03176b824b002a7dbc68c383212a36c5b9108b6607d8f5b30dfaf53ac33915e1c6ec595ddcd9b9589ed7dda0c24cb46c8dcf024eadac48f4a811299b02c88034212b2f5ea529040145862f7fb39b762f89e0af907efc4a658f2bb4bb0583cdec7142be40d3063327f17490cbc9782a41e5e7989cf778c520af61ec9355245ffed3ba977808f194af2948fac32c2e4c7de7b65e8404ae9e41809336ad01479004a4d678534c1a005f3f2844babc1b869964d86e8ccc999baa16b700964733c79402cf5c9753197f6a680056eae1bd5960efdea6bc41f91f29b46c7caf4a16065d2a27195d100303e9e593a7c7d0a0ee9e8144185d586a0dd93fde3373345a92f602f466e24304d6401b190ea360dce67775165032cb0e0ae93cef7172aeb4f8008a85b72ff398c4233f45ab50f4ff4d1649fce1090d324be0bdd6a704ded011100990ce25a7a1d43ad643de7d8441317727dce7faf0dbb18741a4b761345f31aba6497a56e0ab056d25c00370860afd6cb6474da256987b6b7fe076e2e303089497c480add816036d63632ce4f50c248c4b7f8b9fedd64425a23bb8ad0b605de57967a2e1ffd29a4ac1c7c4e8b898744017eec664f2e9a7f27203463fad7be53323f16db5af46fac1c1204a7877527cf8ac02213011cd6bde6bd940dfad48d50c4dd167464f1ede442f7074f85699d927657c65f5917bba164c75caf99ba9be7aebbfb7d681270d1dc0f7e5f968d92a287501439f334a8c571a9caf49a2486dd0b2ed0f39ed9b8c2a4f0c95d79c52186a6491cffd5b3d86e7c783a8a77786c316eac3fab287b35b5b4682f57f649bc1c485815d1179e79c7662e5b26067450f448e836f22fb2b496df01537d88b6b24facc31af723fd65e13681b0ac6a99becc4490fa51a7c1ff11a435d91492f977f96539a032e5a210abb8e9cfe2fad753055a76ade20b8f1e789bbc1bb7c48819fe7c628f821ee3a3819767682da7c8684e592d63f996b2601997712cf1fb7d7bdcb2abc9e653e74679a33adb39facc74150b3438a2a21a67c952766ac7d0df9c6bcc29c657be4ed606ed7561d763ff6ae8dfdedcfa20fa1dae94e81208715123313534a3c84601cc113d4d18e3d3d206d3cf7d19896b8a2a4f467617780f6fba94daf59a95122fcc54086cbabeffda2bf32817dfee0005f277c7b7f4b89586615445af321432c859c9b3989f639da0781c4b8ec73a0265027a78f7199133d5dbc746aeeb62a310604865d6187d69d836baf708351a31af4099d59037bffb5f6a226c13a08b25cc7f0aef0ea62701940a7792721cfbac02e5bd10f5d0a7270eefc58229f65cf0c6a89393e6332efcb7a2d4631307fd8cce3a76de979e708d569f33b2cd0789621e6918189edf5b212b06c458fab6a767b41d1dafd6092b89bd1539cd04ed3780075dc1ec0d013b7dd6bdf3014658e554e7f3822269c4ed61eb446b67cb442c28bb7944cec84b0ddf2fa556714c10fdbdb6aee92441f5a058fba29193f1901aa54248110dda84124d9cc07e72f16aff8700130e4b10bc40279c6ca14bef773906bba7563e23668d72306e100f412d9a27a29a36d831f736f03043006d60c8ba6eab2b732443ebb3b6bab2e7f617a1893c5bd204382f3392438b5edd0414070bce091dbd12101bae386890d8cfabbec9065a8134731f669c70bdb053d0a843339926ca4cec6b1bd71c770337adb81c260ea55d8794e664bce5af074f977d0b2afbf2b070f78e4409094c23e4c4ad1fae4a61300d4df2b2725499246cfef92c9c4a785fd5067fb90302ddc26faf7ae6f9c69e7ff87d07c4c5c396d4395590c876c9f8698aea8b966bb5ca399d98cac5dbde89d510b5fbb9478b5a0c57013b3363e504305223ff7bef6dcd10aec6cb9433350d0c9a8877a154f1e9088ca83949284d5d060084ace8203f91844c7f28ea9833236a3b3e512bd8df9662a344b30a749cf4b4d783f115ca09f703127e86ea344599fb71ea3cbcfa23704e8ddd91acb4b908b0db71f3ed326c6e7f87f5e3030711c080e57407c9b0359abcd68801c0f0915f2435cc1382043ce9dafce198e246999ca1424405fd4facf83f49e6981bbf366eedc25dad64ce941c69fe57cd983cd93b8b85012e4e3f68736f8ff76538447aca6c1f1cf419b4065f10b7de1af5d99f30366fcad727e012f1a24598a6d7d6c06f3113dfb136c17d666a384c5c8d5545036e472289fb24c254fdec6b9f5327fa48a2edaf9456db72921f6551b8e39b170221e0282c2a05ad8206deb2b303143b92cef8a889b21f2aaedd09d3001e9e1041df296a489a4a0b83fdeb17c4541353ad6739048a5e0a0885edd4f055b1c72a4addd81978916dc5ac8996040ea190778dab084c6e4e0997e3efc17e479033b4cd16fbeb2d3415cfd910ca766c1c09c3b816bf08db953ce1a3aacc18b69ce7932c95fd67c44973347fe9475daa5351f1c410c5852fb8b30a5fdf35608722571b087326f29040a759f3f96d125ed86645f7f89d961ddd86a7f84c3e3bb52e3e9ffcffe03f83908972b7b2e160224e8eff697d22dae6ae4357152950feb4cce57b1ef6c6f9436d1b7084b502b558878847f57466d667920470e538c1998a4e9e892a56f0e06207ab7497fe1e5e7e542d1376d8285fe1302de270f1b65999adcab2bb8b4c006d4f76b6ffe832999b77e89679cbcab401b34f14442195b6dca0339d28bd1d34bdd1ea6514dcef1024b896cb5b9d01d89568fe3bd65b4f629842d79d8328337feec240f39f7098fac870de90bace9ba8d34d74a7532590f26005502c2df4551034b374d34447ef7f222a38db480419ef7c8e536b379268ce47de99ebec36fa01412adb2358ecbcc70c3bdc5fcbe3e41adfc3ac16d87aee511666e927c6dc6ca55fce122064cfd440fba6c09ec431cbf3c287cd724db4947a4268e72ba0acc127d7365b3b975e0fe81973025468e153735d120137da820dcf4e9461c4d37b769424a7fb77e0753026d2cfc969f64a72e4f9170d0b854edd395357f35d49e6a30086c1421f85b5895c306f6e39e4ce6bfd362fccdd2037358f27f0bceb05c1ee53af2675a411318d350a049a7b3f166db28b99447c84792ea7f3bfd099ed3bc52e039a158141b50e0365ad7d6a6b7cd1bd320dedefd0a943981966801f70e439e3421d59f7a43f3d54477359fd9466f8df6f3fbbf9c019384430ea5583b9211d9180ea54fff4cd967670d8552796f58269504bc1bf131a6b04573fefa976c6cf114ef5928627a2f05b6e1f29a23d85e5473a9cb0b6ca31e78adce33aec34c1998f3d35bb4d5c94113ecd9459ab3c6631f0e08a40bb1bccbe970b708e0bc78fd3e4b3056bf53148956ba8b5da58bc71119372aa4ff3c41eb1e655106ec668d689f5758389c5bd67afff87e2575dda6cc089afca195749d5b33e2916eb8c2faac7ae6a51a0509223ed8d16b038b1606b9755e5b4975bddd3cb1884a88ec4d12ff7d0b9370ddb7aa2d8adfc21d34772169ba65e317d8572f80ea7b02f6038f5b77c3e0da8c4edd70242df1001fdfaeb3a993b9791319e1939f51af47a1082bbb29bb6b159a5d0d6af295cfdc7b6b020bafab3f97f252b5b43302fb94876d84fca74712c903e612fab14347436d0aa78116fa25fc29ce6abb7955160bf4c569693961afbae6ff4fdb9b009b515bf82f14db0151e90a0f2dfc463591c667f46e23767731abbae99a8d893cbd3e7d05aeeaca9b3a7601c436f1f9aacd291dca0342916716185cbb3c3995fac8c15af32f833ca4b7d42f6d67952e1f1676f0ef8099c9498c00a06b0b658beccb12b6b546d831e25c06c897ad3a0f23c2177740b2dd600bbfde02c77d10df99de74d11840f4414f0e7c742932a57db2c05f07f1d2d15162267a150023afc543f171f69440760b4b36dd986e4250c926ad0cced02bbda8d49610c3643cfa76fff1e8ff650992964274ff5d5294a05571d1ccd60a3ece5e8fd4d0f0067e0694796dc37b2e1542088a77f197f0e0a73442e9af556408fb1f4b1c0b8ba4025e80bddc5babce0bd8f730559b6a8300e35fee1f40a9978a40fde31ff739095c0753bd431728d153b65a0b7bedc7bc1b313ddeb0ac2914621bdbdf8a83ae643e6607b09cbfb341a261a70500d113b96e4aa243c90c702e3f491c307813890526b8a90ae86c11b4a5e3a8c742300c6227d74f0c93d403632e34167d12b2c61bac3690b9af1fcd0307c3f6972664cd4f09682f34eae5613795b993a8974718c00fad957630f5c4d5a89ed9fc5ed80f999d7ee3a7d5602ab98efcf0f1f050e2a19071399a81a087e4d6d523073fdf86813169abff3a8ad53c87f90f91e5e5dd050cc23b2543eef14d2ba878c472eca94735fef10f8c63c70a899d15f9550430756104d52542f97ef417a28ec8c43f156d47a1b020057d63c78935845245ffe877edf3792fba9aabbb9329ec2d8b1259eecd8f1a4f51ca74bdde0b0d6cc48fd3eaa6cc8475122da6d095890601cba442092fb7cb2dbc81752caadbc346bfe7d06384f95b4d9514f4af431a5a6e198222a6f17cfe4ad150507fd82c5aea730d19a6efa1140c3b10e9a25de8df40f324870d1da5d15de2ccd9d055992b0cbf732009789f52e80645d880bad25e4b7cc6a480552dccbbed21d5456f61d865fd0f331aff295bbeca9c157191b0df5d08b8e89feb9fa4fbb208e13ab236d0e2d54297039210f37a740b931630c9481e1e5a1f1fba8a84fb744be0c41e8d0aaf3e87fcdcf70b42e28172f8177084e84cc6fd6282d63a3b722201c99aa1b08714e987935257be91b218f4e26d5a1f78095193428d2833755aec9094ea79f1b9c0fe7b18c7f552087812dce89a0fd685756e6c70b481db0f6e247781bfc", 0x1000}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000080)=@nfc={0x27, 0x0, 0x1, 0x6}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000140)="2b028cf609966f555b6be28f7f0408796c3db7caeb88cf4ea137c6ebb93746f571c3153cb28fbde84a88d89e3d54d6c27cf0a76cc6f0838de65a93ae15a9920fb2a9b1ddfe7babce0e59d946b1d470108de70e1655316dd7dbdcc4f91cd6b6284ee87e0dd5f51175778f6344ce6856a8005e797cc059a57d21a90b", 0x7b}], 0x1}, 0x400c0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r2 = socket$kcm(0x2, 0x3, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x381000, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)={[{0x2f, 'pids'}, {0x2f, 'rdma'}, {0x2d, 'cpu'}, {0x0, 'cpu'}, {0x0, 'cpu'}]}, 0x1b) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r6, &(0x7f0000000400), 0x0) openat$cgroup_ro(r4, &(0x7f0000000340)='cpuset.effective_mems\x00', 0x0, 0x0) sendmsg$kcm(r5, &(0x7f0000000400)={&(0x7f0000001440)=@rc={0x1f, {0x3, 0xe7, 0x5, 0x1, 0x2, 0x4}, 0x40}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001900)="27f9094f3b81e8bb7067446a42a134f3ee0e727eba35f0d49c430e172820bf7578764316bd0055abfc1b3d0b5b8fa27519010b50a402e1d72b69dc400cfa39effb684afba9bf06bbbeeabcee1c633cd42454b43429e57643f1246e96e71377a8092bae4d1bd673236c6b9caaf998847a440bfb37c0997c796b2d83014929a81fd24fbf26ab719d017d55eea22d9c5af4728ab03236c9e78670859ac73230bc20c73f9dbbe77cfc7963838b51b998db2479237d03489c57c54aa4975f7f1f917c1ecf1b79a1a6f0e40f8aed88b096c4043861ea59ba2778bd", 0xd8}], 0x1}, 0x10) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000040)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000800)={'caif0\x00', @broadcast}) close(r6) 04:11:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x10, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x1}, @exit], &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 04:11:27 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000280)=""/240, 0xfc7b}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x59c9, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x0, 0x0, 0x4000]}, 0x14}, 0x80, &(0x7f0000000340), 0x16, &(0x7f0000000180)}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) 04:11:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002a000500d25a80648c000000070000001a00084002376ee6735e000000053582c137153e370900018000", 0x2e}], 0x1}, 0x0) [ 227.167239][ T9029] device nr0 entered promiscuous mode [ 227.438361][ T9013] device nr0 entered promiscuous mode 04:11:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x10000000012, 0x4, &(0x7f00000000c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x4}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 04:11:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x2}]}}, 0x0, 0x2a}, 0x20) 04:11:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f0000000180)}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="02"], 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400008) write$cgroup_pid(r1, &(0x7f0000000000), 0x20000012) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:11:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x18, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x6, 0x61, 0x0, 0x4}]}, &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\xd3\xc0I\x960(U\x06\t.\xc3\t\xa4\xd5\x99\x02_2\x01\r\xf8\xedxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 04:11:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x204000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)="cc23614414ce7391fcf8fb42be0899decd6dd248766eed2314a5b857e50847640b14f0c0e6348a805ae2013389041c917f2e85088cb7663787dcb491896c3e0f20dc160568a4e366bdf144a59deb0b229e07de15e1dba6640fefa93d4fc2b4805d74362e1531958ff58863c7101769", 0x6f}], 0x1}, 0x4000001) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) close(r3) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) 04:11:28 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x4, 0x80000000004, 0xe657}, 0x2c) close(r0) 04:11:28 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2082}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000002c0), 0x1}, 0x0) 04:11:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f0000000180)}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="02"], 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400008) write$cgroup_pid(r1, &(0x7f0000000000), 0x20000012) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:11:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000001ac0)={r0, r0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0, r0}) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0xfffffffffffffe75) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000640)=0x9cf) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x9, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x100000001, 0x2, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x3cab, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 04:11:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x5, &(0x7f00000000c0), 0x3b1) 04:11:28 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00014107410000000a00180e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) 04:11:28 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x4, 0x80000000004, 0xe657}, 0x2c) close(r0) 04:11:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x204000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)="cc23614414ce7391fcf8fb42be0899decd6dd248766eed2314a5b857e50847640b14f0c0e6348a805ae2013389041c917f2e85088cb7663787dcb491896c3e0f20dc160568a4e366bdf144a59deb0b229e07de15e1dba6640fefa93d4fc2b4805d74362e1531958ff58863c7101769", 0x6f}], 0x1}, 0x4000001) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) close(r3) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) 04:11:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x204000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)="cc23614414ce7391fcf8fb42be0899decd6dd248766eed2314a5b857e50847640b14f0c0e6348a805ae2013389041c917f2e85088cb7663787dcb491896c3e0f20dc160568a4e366bdf144a59deb0b229e07de15e1dba6640fefa93d4fc2b4805d74362e1531958ff58863c7101769", 0x6f}], 0x1}, 0x4000001) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) close(r3) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) 04:11:29 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x4, 0x80000000004, 0xe657}, 0x2c) close(r0) 04:11:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffff3) sendmsg(r1, 0x0, 0x0) sendmsg$kcm(r1, 0x0, 0x400c0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) r2 = socket$kcm(0x2, 0x3, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x280000, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[@ANYBLOB="2f70696473202f72646d61202d6370752000c03fe09ba500637075200063707520"], 0x21) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r6, &(0x7f0000000000)={[{0x2dcd3, 'memory', 0xe}]}, 0x200600) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1b) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_ro(r4, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000040)) 04:11:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f0000000180)}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="02"], 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400008) write$cgroup_pid(r1, &(0x7f0000000000), 0x20000012) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:11:29 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x4, 0x80000000004, 0xe657}, 0x2c) close(r0) 04:11:29 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x9, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a00)=[{0x0}, {&(0x7f0000000680)=""/177, 0xb1}, {&(0x7f0000000740)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000001a80)=""/221, 0xdd}, 0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000001c00)={0x2, 0x70, 0x0, 0x800, 0x800, 0x7, 0x0, 0x0, 0x2, 0x4, 0x0, 0x8000, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4, 0x4, 0x0, 0x6, 0x0, 0x1, 0x8001, 0x0, 0x80000000, 0x2, 0x0, 0x1, 0x6, 0xc776, 0x0, 0x9, 0x2, @perf_bp={0x0, 0x2}, 0x400, 0x0, 0x7ff, 0x0, 0x4, 0x7, 0x492}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) socketpair(0x0, 0x0, 0x1000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) openat$cgroup_int(r1, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) openat$cgroup_subtree(r3, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) recvmsg$kcm(r2, 0x0, 0x40002001) recvmsg$kcm(r2, 0x0, 0x0) [ 229.735581][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 229.735597][ T26] audit: type=1804 audit(1558498290.618:31): pid=9126 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir330579235/syzkaller.ZcBew6/28/memory.events" dev="sda1" ino=15971 res=1 [ 229.798905][ T26] audit: type=1800 audit(1558498290.618:32): pid=9126 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=15971 res=0 04:11:30 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x9, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a00)=[{0x0}, {&(0x7f0000000680)=""/177, 0xb1}, {&(0x7f0000000740)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000001a80)=""/221, 0xdd}, 0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000001c00)={0x2, 0x70, 0x0, 0x800, 0x800, 0x7, 0x0, 0x0, 0x2, 0x4, 0x0, 0x8000, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4, 0x4, 0x0, 0x6, 0x0, 0x1, 0x8001, 0x0, 0x80000000, 0x2, 0x0, 0x1, 0x6, 0xc776, 0x0, 0x9, 0x2, @perf_bp={0x0, 0x2}, 0x400, 0x0, 0x7ff, 0x0, 0x4, 0x7, 0x492}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) socketpair(0x0, 0x0, 0x1000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) openat$cgroup_int(r1, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) openat$cgroup_subtree(r3, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) recvmsg$kcm(r2, 0x0, 0x40002001) recvmsg$kcm(r2, 0x0, 0x0) [ 229.866507][ T26] audit: type=1804 audit(1558498290.618:33): pid=9132 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir330579235/syzkaller.ZcBew6/28/memory.events" dev="sda1" ino=15971 res=1 [ 229.927499][ T26] audit: type=1800 audit(1558498290.618:34): pid=9132 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=15971 res=0 04:11:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000001ac0)={r0, r0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0, r0}) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0xfffffffffffffe75) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000640)=0x9cf) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x9, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x100000001, 0x2, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x3cab, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 04:11:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x204000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)="cc23614414ce7391fcf8fb42be0899decd6dd248766eed2314a5b857e50847640b14f0c0e6348a805ae2013389041c917f2e85088cb7663787dcb491896c3e0f20dc160568a4e366bdf144a59deb0b229e07de15e1dba6640fefa93d4fc2b4805d74362e1531958ff58863c7101769", 0x6f}], 0x1}, 0x4000001) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) close(r3) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) 04:11:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffff3) sendmsg(r1, 0x0, 0x0) sendmsg$kcm(r1, 0x0, 0x400c0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) r2 = socket$kcm(0x2, 0x3, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x280000, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[@ANYBLOB="2f70696473202f72646d61202d6370752000c03fe09ba500637075200063707520"], 0x21) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r6, &(0x7f0000000000)={[{0x2dcd3, 'memory', 0xe}]}, 0x200600) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1b) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_ro(r4, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000040)) 04:11:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x204000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)="cc23614414ce7391fcf8fb42be0899decd6dd248766eed2314a5b857e50847640b14f0c0e6348a805ae2013389041c917f2e85088cb7663787dcb491896c3e0f20dc160568a4e366bdf144a59deb0b229e07de15e1dba6640fefa93d4fc2b4805d74362e1531958ff58863c7101769", 0x6f}], 0x1}, 0x4000001) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) close(r3) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) 04:11:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f0000000180)}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="02"], 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400008) write$cgroup_pid(r1, &(0x7f0000000000), 0x20000012) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:11:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffff3) sendmsg(r1, 0x0, 0x0) sendmsg$kcm(r1, 0x0, 0x400c0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) r2 = socket$kcm(0x2, 0x3, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x280000, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[@ANYBLOB="2f70696473202f72646d61202d6370752000c03fe09ba500637075200063707520"], 0x21) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r6, &(0x7f0000000000)={[{0x2dcd3, 'memory', 0xe}]}, 0x200600) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1b) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_ro(r4, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000040)) 04:11:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x204000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)="cc23614414ce7391fcf8fb42be0899decd6dd248766eed2314a5b857e50847640b14f0c0e6348a805ae2013389041c917f2e85088cb7663787dcb491896c3e0f20dc160568a4e366bdf144a59deb0b229e07de15e1dba6640fefa93d4fc2b4805d74362e1531958ff58863c7101769", 0x6f}], 0x1}, 0x4000001) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) close(r3) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) 04:11:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x204000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)="cc23614414ce7391fcf8fb42be0899decd6dd248766eed2314a5b857e50847640b14f0c0e6348a805ae2013389041c917f2e85088cb7663787dcb491896c3e0f20dc160568a4e366bdf144a59deb0b229e07de15e1dba6640fefa93d4fc2b4805d74362e1531958ff58863c7101769", 0x6f}], 0x1}, 0x4000001) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) close(r3) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) 04:11:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000001ac0)={r0, r0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0, r0}) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0xfffffffffffffe75) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000640)=0x9cf) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x9, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x100000001, 0x2, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x3cab, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') [ 231.030188][ T26] audit: type=1800 audit(1558498291.908:35): pid=9139 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16068 res=0 04:11:31 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x9, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a00)=[{0x0}, {&(0x7f0000000680)=""/177, 0xb1}, {&(0x7f0000000740)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000001a80)=""/221, 0xdd}, 0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000001c00)={0x2, 0x70, 0x0, 0x800, 0x800, 0x7, 0x0, 0x0, 0x2, 0x4, 0x0, 0x8000, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4, 0x4, 0x0, 0x6, 0x0, 0x1, 0x8001, 0x0, 0x80000000, 0x2, 0x0, 0x1, 0x6, 0xc776, 0x0, 0x9, 0x2, @perf_bp={0x0, 0x2}, 0x400, 0x0, 0x7ff, 0x0, 0x4, 0x7, 0x492}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) socketpair(0x0, 0x0, 0x1000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) openat$cgroup_int(r1, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) openat$cgroup_subtree(r3, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) recvmsg$kcm(r2, 0x0, 0x40002001) recvmsg$kcm(r2, 0x0, 0x0) 04:11:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffff3) sendmsg(r1, 0x0, 0x0) sendmsg$kcm(r1, 0x0, 0x400c0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) r2 = socket$kcm(0x2, 0x3, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x280000, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[@ANYBLOB="2f70696473202f72646d61202d6370752000c03fe09ba500637075200063707520"], 0x21) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r6, &(0x7f0000000000)={[{0x2dcd3, 'memory', 0xe}]}, 0x200600) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1b) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_ro(r4, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000040)) [ 232.108006][ T26] audit: type=1804 audit(1558498292.988:36): pid=9195 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir330579235/syzkaller.ZcBew6/30/memory.events" dev="sda1" ino=15972 res=1 04:11:33 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x9, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a00)=[{0x0}, {&(0x7f0000000680)=""/177, 0xb1}, {&(0x7f0000000740)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000001a80)=""/221, 0xdd}, 0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000001c00)={0x2, 0x70, 0x0, 0x800, 0x800, 0x7, 0x0, 0x0, 0x2, 0x4, 0x0, 0x8000, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4, 0x4, 0x0, 0x6, 0x0, 0x1, 0x8001, 0x0, 0x80000000, 0x2, 0x0, 0x1, 0x6, 0xc776, 0x0, 0x9, 0x2, @perf_bp={0x0, 0x2}, 0x400, 0x0, 0x7ff, 0x0, 0x4, 0x7, 0x492}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) socketpair(0x0, 0x0, 0x1000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) openat$cgroup_int(r1, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) openat$cgroup_subtree(r3, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) recvmsg$kcm(r2, 0x0, 0x40002001) recvmsg$kcm(r2, 0x0, 0x0) [ 232.167721][ T26] audit: type=1800 audit(1558498293.018:37): pid=9195 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=15972 res=0 04:11:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000001ac0)={r0, r0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0, r0}) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0xfffffffffffffe75) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000640)=0x9cf) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x9, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x100000001, 0x2, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x3cab, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 04:11:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000001ac0)={r0, r0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0, r0}) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0xfffffffffffffe75) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000640)=0x9cf) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x9, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x100000001, 0x2, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x3cab, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 04:11:33 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x9, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a00)=[{0x0}, {&(0x7f0000000680)=""/177, 0xb1}, {&(0x7f0000000740)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000001a80)=""/221, 0xdd}, 0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000001c00)={0x2, 0x70, 0x0, 0x800, 0x800, 0x7, 0x0, 0x0, 0x2, 0x4, 0x0, 0x8000, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4, 0x4, 0x0, 0x6, 0x0, 0x1, 0x8001, 0x0, 0x80000000, 0x2, 0x0, 0x1, 0x6, 0xc776, 0x0, 0x9, 0x2, @perf_bp={0x0, 0x2}, 0x400, 0x0, 0x7ff, 0x0, 0x4, 0x7, 0x492}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) socketpair(0x0, 0x0, 0x1000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) openat$cgroup_int(r1, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) openat$cgroup_subtree(r3, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) recvmsg$kcm(r2, 0x0, 0x40002001) recvmsg$kcm(r2, 0x0, 0x0) 04:11:33 executing program 5: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x21, 0x0, 0x0) 04:11:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="0070696f2f80010000fa5f192104756d6f72792000"], 0x15) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) 04:11:34 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30b) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xfdef) [ 233.242181][ T26] audit: type=1800 audit(1558498294.128:38): pid=9202 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=15990 res=0 04:11:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="0070696f2f80010000fa5f192104756d6f72792000"], 0x15) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) 04:11:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="0070696f2f80010000fa5f192104756d6f72792000"], 0x15) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 233.573929][ T9233] device nr0 entered promiscuous mode 04:11:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000001ac0)={r0, r0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0, r0}) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0xfffffffffffffe75) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000640)=0x9cf) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x9, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x100000001, 0x2, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x3cab, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 04:11:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="0070696f2f80010000fa5f192104756d6f72792000"], 0x15) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) 04:11:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="0070696f2f80010000fa5f192104756d6f72792000"], 0x15) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 233.927345][ T26] audit: type=1800 audit(1558498294.808:39): pid=9216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16063 res=0 04:11:34 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x9, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a00)=[{0x0}, {&(0x7f0000000680)=""/177, 0xb1}, {&(0x7f0000000740)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000001a80)=""/221, 0xdd}, 0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000001c00)={0x2, 0x70, 0x0, 0x800, 0x800, 0x7, 0x0, 0x0, 0x2, 0x4, 0x0, 0x8000, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4, 0x4, 0x0, 0x6, 0x0, 0x1, 0x8001, 0x0, 0x80000000, 0x2, 0x0, 0x1, 0x6, 0xc776, 0x0, 0x9, 0x2, @perf_bp={0x0, 0x2}, 0x400, 0x0, 0x7ff, 0x0, 0x4, 0x7, 0x492}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) socketpair(0x0, 0x0, 0x1000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) openat$cgroup_int(r1, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) openat$cgroup_subtree(r3, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) recvmsg$kcm(r2, 0x0, 0x40002001) recvmsg$kcm(r2, 0x0, 0x0) 04:11:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="0070696f2f80010000fa5f192104756d6f72792000"], 0x15) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) 04:11:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="0070696f2f80010000fa5f192104756d6f72792000"], 0x15) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 235.022643][ T26] audit: type=1804 audit(1558498295.908:40): pid=9266 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir682827918/syzkaller.43bxQs/18/memory.events" dev="sda1" ino=15990 res=1 [ 235.078659][ T26] audit: type=1800 audit(1558498295.928:41): pid=9266 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=15990 res=0 04:11:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000001ac0)={r0, r0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0, r0}) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0xfffffffffffffe75) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000640)=0x9cf) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x9, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x100000001, 0x2, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x3cab, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 04:11:37 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 04:11:37 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1000000000000001, 0x0) sendmsg$kcm(r1, 0x0, 0x20008844) r2 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000000)='&@[\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000280), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000680)='&@[\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x01\xd3\xd0\xb0\x9cGs\t\x00', 0x1132}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='bridge_slave_1\x00') gettid() 04:11:37 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e00000036008182e45ae087185082cf0324b0eba06ef9075b3f00169148790700d90080e2300000000020000000", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x42, &(0x7f0000000040), 0x52d) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) 04:11:37 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x9, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a00)=[{0x0}, {&(0x7f0000000680)=""/177, 0xb1}, {&(0x7f0000000740)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000001a80)=""/221, 0xdd}, 0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000001c00)={0x2, 0x70, 0x0, 0x800, 0x800, 0x7, 0x0, 0x0, 0x2, 0x4, 0x0, 0x8000, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4, 0x4, 0x0, 0x6, 0x0, 0x1, 0x8001, 0x0, 0x80000000, 0x2, 0x0, 0x1, 0x6, 0xc776, 0x0, 0x9, 0x2, @perf_bp={0x0, 0x2}, 0x400, 0x0, 0x7ff, 0x0, 0x4, 0x7, 0x492}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) socketpair(0x0, 0x0, 0x1000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) openat$cgroup_int(r1, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) openat$cgroup_subtree(r3, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) recvmsg$kcm(r2, 0x0, 0x40002001) recvmsg$kcm(r2, 0x0, 0x0) 04:11:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 04:11:37 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)='{wlan1selinux].#system-GPLmime_type\x00'}, 0x30) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x30, &(0x7f0000000040), 0x52d) [ 236.612043][ T9299] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. 04:11:37 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e00000036008182e45ae087185082cf0324b0eba06ef9075b3f00169148790700d90080e2300000000020000000", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x42, &(0x7f0000000040), 0x52d) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) [ 236.806360][ T9309] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. 04:11:37 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x95}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x9, &(0x7f0000000080), 0x9c) 04:11:37 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)='{wlan1selinux].#system-GPLmime_type\x00'}, 0x30) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x30, &(0x7f0000000040), 0x52d) 04:11:37 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e00000036008182e45ae087185082cf0324b0eba06ef9075b3f00169148790700d90080e2300000000020000000", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x42, &(0x7f0000000040), 0x52d) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) 04:11:37 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x6d000) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0x29, 0x3, 0x0) openat$cgroup(r2, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.events\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x2, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000100)={r3}) socket$kcm(0x10, 0x0, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 237.018705][ T9318] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 237.122878][ T26] audit: type=1804 audit(1558498297.998:42): pid=9291 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir682827918/syzkaller.43bxQs/19/memory.events" dev="sda1" ino=16095 res=1 [ 237.171757][ T26] audit: type=1800 audit(1558498298.038:43): pid=9291 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16095 res=0 04:11:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0xfe29d8}], 0x1, 0x0, 0x101}, 0x3f00) 04:11:39 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e00000036008182e45ae087185082cf0324b0eba06ef9075b3f00169148790700d90080e2300000000020000000", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x42, &(0x7f0000000040), 0x52d) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) 04:11:39 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x6d000) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0x29, 0x3, 0x0) openat$cgroup(r2, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.events\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x2, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000100)={r3}) socket$kcm(0x10, 0x0, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:11:39 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)='{wlan1selinux].#system-GPLmime_type\x00'}, 0x30) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x30, &(0x7f0000000040), 0x52d) 04:11:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x800000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, &(0x7f0000000000), 0x4) 04:11:39 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, r1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000500)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x4f, 0x1, 0x0, 0x1, 0x200, 0xb, 0x8000, 0x1, 0x7, 0x100000000, 0x1, 0xfff, 0x200, 0x20, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x6, 0x8, 0x51, 0x5, 0x1, 0x100, 0x0, 0x0, 0x69e, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x69712638}, 0x0, 0x0, 0x5, 0x8, 0x0, 0x5, 0x4}, 0xffffffffffffffff, 0x2, r3, 0xb) openat$cgroup_procs(r4, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000540)={0x7, 0x70, 0x2, 0x0, 0x10000, 0x9, 0x0, 0x8000, 0x4000, 0x8, 0x0, 0x5f64, 0x7, 0x0, 0x400, 0x1, 0xafd, 0x0, 0x3cd, 0x0, 0xa302, 0x7f, 0x80000000, 0x0, 0x5, 0x0, 0x3, 0x6, 0x0, 0x5, 0x10000, 0x0, 0x100, 0x0, 0x8a9, 0x0, 0x6, 0x7fff, 0x0, 0xaefff88, 0x0, @perf_bp={0x0}, 0x18020, 0x7, 0x5a51, 0x3, 0x7, 0x41, 0x1}, 0x0, 0xe, r0, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r6, r0, 0x0, 0x0, 0x0}, 0x30) [ 238.308351][ T9343] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. 04:11:39 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)='{wlan1selinux].#system-GPLmime_type\x00'}, 0x30) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x30, &(0x7f0000000040), 0x52d) 04:11:39 executing program 5: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000040)=0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8953, &(0x7f0000000040)=0x2) 04:11:39 executing program 1: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000340)) 04:11:39 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x6d000) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0x29, 0x3, 0x0) openat$cgroup(r2, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.events\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x2, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000100)={r3}) socket$kcm(0x10, 0x0, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:11:39 executing program 4: r0 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b187000000", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000001300)=""/81, 0x51}, {&(0x7f0000001380)=""/184, 0xb8}, {&(0x7f0000001440)=""/150, 0x96}], 0x4}, 0x0) recvmsg$kcm(r0, &(0x7f0000005e40)={0x0, 0x0, 0x0}, 0x0) 04:11:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e001000"/46, 0x2e}], 0x1}, 0x0) [ 238.874288][ T9379] IPv6: NLM_F_CREATE should be specified when creating new route 04:11:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0xfe29d8}], 0x1, 0x0, 0x101}, 0x3f00) 04:11:40 executing program 4: r0 = socket$kcm(0xa, 0x8000000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x40000000, 0x0, 0xaa00000000000000, 0x80fe}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000080)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc85a2b1496c0c48000302080a2f858ad2c4aa412d", 0x48}], 0x1}, 0x0) 04:11:40 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, r1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000500)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x4f, 0x1, 0x0, 0x1, 0x200, 0xb, 0x8000, 0x1, 0x7, 0x100000000, 0x1, 0xfff, 0x200, 0x20, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x6, 0x8, 0x51, 0x5, 0x1, 0x100, 0x0, 0x0, 0x69e, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x69712638}, 0x0, 0x0, 0x5, 0x8, 0x0, 0x5, 0x4}, 0xffffffffffffffff, 0x2, r3, 0xb) openat$cgroup_procs(r4, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000540)={0x7, 0x70, 0x2, 0x0, 0x10000, 0x9, 0x0, 0x8000, 0x4000, 0x8, 0x0, 0x5f64, 0x7, 0x0, 0x400, 0x1, 0xafd, 0x0, 0x3cd, 0x0, 0xa302, 0x7f, 0x80000000, 0x0, 0x5, 0x0, 0x3, 0x6, 0x0, 0x5, 0x10000, 0x0, 0x100, 0x0, 0x8a9, 0x0, 0x6, 0x7fff, 0x0, 0xaefff88, 0x0, @perf_bp={0x0}, 0x18020, 0x7, 0x5a51, 0x3, 0x7, 0x41, 0x1}, 0x0, 0xe, r0, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r6, r0, 0x0, 0x0, 0x0}, 0x30) 04:11:40 executing program 5: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x40000000) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x200, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0xa, 0x300) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) sendmsg(r2, &(0x7f0000000200)={&(0x7f00000002c0)=@in={0x2, 0x4e23, @rand_addr=0x10000}, 0x80, 0x0}, 0x40) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f00000000c0)={0x3, 0x0, [0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)='/dev/net/tun\x00') getpid() perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x3ff, 0x0, 0xffffffffffff6688, 0x6, 0x5, 0x0, 0x8, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x8000000000, 0x9, 0x400, 0x7fff, 0x401, 0x3cab, 0x0, 0x81, 0x9, 0x0, 0x100, 0x0, 0x0, 0x7, @perf_config_ext={0x1e, 0x8001}, 0x0, 0x9, 0x0, 0x0, 0x2, 0xe4, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000640)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) 04:11:40 executing program 1: r0 = socket$kcm(0xa, 0x20000000000802, 0x88) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000018c0)) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040), 0xfffffda7}], 0x1}, 0x40) 04:11:40 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x6d000) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0x29, 0x3, 0x0) openat$cgroup(r2, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.events\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x2, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000100)={r3}) socket$kcm(0x10, 0x0, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:11:40 executing program 4: r0 = socket$kcm(0xa, 0x8000000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x40000000, 0x0, 0xaa00000000000000, 0x80fe}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000080)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc85a2b1496c0c48000302080a2f858ad2c4aa412d", 0x48}], 0x1}, 0x0) 04:11:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0xfe29d8}], 0x1, 0x0, 0x101}, 0x3f00) 04:11:40 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, r1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000500)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x4f, 0x1, 0x0, 0x1, 0x200, 0xb, 0x8000, 0x1, 0x7, 0x100000000, 0x1, 0xfff, 0x200, 0x20, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x6, 0x8, 0x51, 0x5, 0x1, 0x100, 0x0, 0x0, 0x69e, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x69712638}, 0x0, 0x0, 0x5, 0x8, 0x0, 0x5, 0x4}, 0xffffffffffffffff, 0x2, r3, 0xb) openat$cgroup_procs(r4, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000540)={0x7, 0x70, 0x2, 0x0, 0x10000, 0x9, 0x0, 0x8000, 0x4000, 0x8, 0x0, 0x5f64, 0x7, 0x0, 0x400, 0x1, 0xafd, 0x0, 0x3cd, 0x0, 0xa302, 0x7f, 0x80000000, 0x0, 0x5, 0x0, 0x3, 0x6, 0x0, 0x5, 0x10000, 0x0, 0x100, 0x0, 0x8a9, 0x0, 0x6, 0x7fff, 0x0, 0xaefff88, 0x0, @perf_bp={0x0}, 0x18020, 0x7, 0x5a51, 0x3, 0x7, 0x41, 0x1}, 0x0, 0xe, r0, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r6, r0, 0x0, 0x0, 0x0}, 0x30) 04:11:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0xfffffffffffffffe) getpid() bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x10000000000001) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 04:11:40 executing program 4: r0 = socket$kcm(0xa, 0x8000000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x40000000, 0x0, 0xaa00000000000000, 0x80fe}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000080)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc85a2b1496c0c48000302080a2f858ad2c4aa412d", 0x48}], 0x1}, 0x0) [ 239.590434][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 239.596609][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:11:40 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, r1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000500)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x4f, 0x1, 0x0, 0x1, 0x200, 0xb, 0x8000, 0x1, 0x7, 0x100000000, 0x1, 0xfff, 0x200, 0x20, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x6, 0x8, 0x51, 0x5, 0x1, 0x100, 0x0, 0x0, 0x69e, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x69712638}, 0x0, 0x0, 0x5, 0x8, 0x0, 0x5, 0x4}, 0xffffffffffffffff, 0x2, r3, 0xb) openat$cgroup_procs(r4, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000540)={0x7, 0x70, 0x2, 0x0, 0x10000, 0x9, 0x0, 0x8000, 0x4000, 0x8, 0x0, 0x5f64, 0x7, 0x0, 0x400, 0x1, 0xafd, 0x0, 0x3cd, 0x0, 0xa302, 0x7f, 0x80000000, 0x0, 0x5, 0x0, 0x3, 0x6, 0x0, 0x5, 0x10000, 0x0, 0x100, 0x0, 0x8a9, 0x0, 0x6, 0x7fff, 0x0, 0xaefff88, 0x0, @perf_bp={0x0}, 0x18020, 0x7, 0x5a51, 0x3, 0x7, 0x41, 0x1}, 0x0, 0xe, r0, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r6, r0, 0x0, 0x0, 0x0}, 0x30) 04:11:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0xfe29d8}], 0x1, 0x0, 0x101}, 0x3f00) 04:11:41 executing program 4: r0 = socket$kcm(0xa, 0x8000000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x40000000, 0x0, 0xaa00000000000000, 0x80fe}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000080)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc85a2b1496c0c48000302080a2f858ad2c4aa412d", 0x48}], 0x1}, 0x0) 04:11:41 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) socket$kcm(0x2, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) gettid() bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x5) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002900)='./cgroup.cpu/syz1\x00', 0x1ff) [ 240.510929][ T9444] syz-executor.2 (9444) used greatest stack depth: 22208 bytes left [ 241.492856][ T9432] device lo entered promiscuous mode [ 241.550012][ T9434] Y­4`Ò˜: renamed from lo 04:11:42 executing program 5: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) socket$kcm(0x2, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) gettid() bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x5) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002900)='./cgroup.cpu/syz1\x00', 0x1ff) 04:11:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x0) socket$kcm(0x29, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000140)=@ax25={{0x3, @netrom}, [@default, @remote, @rose, @netrom, @default, @rose, @null, @rose]}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/75, 0x4b}], 0x1, &(0x7f0000000300)=""/2, 0x2}, 0x12001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x10000) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x7}, 0x80, 0x0}, 0x20004040) 04:11:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0xfe29d8}], 0x1, 0x0, 0x101}, 0x3f00) 04:11:42 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) socket$kcm(0x2, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) gettid() bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x5) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002900)='./cgroup.cpu/syz1\x00', 0x1ff) 04:11:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0xfe29d8}], 0x1, 0x0, 0x101}, 0x3f00) 04:11:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0xfffffffffffffffe) getpid() bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x10000000000001) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 04:11:42 executing program 5: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) socket$kcm(0x2, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) gettid() bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x5) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002900)='./cgroup.cpu/syz1\x00', 0x1ff) 04:11:42 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) socket$kcm(0x2, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) gettid() bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x5) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002900)='./cgroup.cpu/syz1\x00', 0x1ff) 04:11:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x0) socket$kcm(0x29, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000140)=@ax25={{0x3, @netrom}, [@default, @remote, @rose, @netrom, @default, @rose, @null, @rose]}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/75, 0x4b}], 0x1, &(0x7f0000000300)=""/2, 0x2}, 0x12001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x10000) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x7}, 0x80, 0x0}, 0x20004040) 04:11:43 executing program 5: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) socket$kcm(0x2, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) gettid() bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x5) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002900)='./cgroup.cpu/syz1\x00', 0x1ff) 04:11:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0xfffffffffffffffe) getpid() bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x10000000000001) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 04:11:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x0) socket$kcm(0x29, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000140)=@ax25={{0x3, @netrom}, [@default, @remote, @rose, @netrom, @default, @rose, @null, @rose]}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/75, 0x4b}], 0x1, &(0x7f0000000300)=""/2, 0x2}, 0x12001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x10000) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x7}, 0x80, 0x0}, 0x20004040) 04:11:43 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) socket$kcm(0x2, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) gettid() bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x5) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002900)='./cgroup.cpu/syz1\x00', 0x1ff) 04:11:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x0) socket$kcm(0x29, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000140)=@ax25={{0x3, @netrom}, [@default, @remote, @rose, @netrom, @default, @rose, @null, @rose]}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/75, 0x4b}], 0x1, &(0x7f0000000300)=""/2, 0x2}, 0x12001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x10000) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x7}, 0x80, 0x0}, 0x20004040) 04:11:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0xfe29d8}], 0x1, 0x0, 0x101}, 0x3f00) 04:11:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x0) socket$kcm(0x29, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000140)=@ax25={{0x3, @netrom}, [@default, @remote, @rose, @netrom, @default, @rose, @null, @rose]}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/75, 0x4b}], 0x1, &(0x7f0000000300)=""/2, 0x2}, 0x12001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x10000) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x7}, 0x80, 0x0}, 0x20004040) 04:11:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 04:11:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0xfffffffffffffffe) getpid() bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x10000000000001) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 04:11:43 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x501e}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000002600)=0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xb, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[], 0x3ae) 04:11:43 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00003c9733f5f087110008abca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702000000000000", 0x39}], 0x1}, 0x0) gettid() perf_event_open(&(0x7f0000001900)={0x7, 0x70, 0xfffffffffffff444, 0x400, 0x0, 0xe0, 0x0, 0x37, 0x40002, 0x5, 0x8, 0x8001, 0x9998, 0x100000000, 0x0, 0x3, 0x4, 0x5, 0x7, 0xcd, 0x2, 0x7fff, 0x1, 0x1, 0x0, 0x0, 0x81, 0xc2, 0x0, 0x7, 0x1, 0x860, 0x5, 0x2, 0xffffffffffffff81, 0x5, 0x9, 0x40, 0x0, 0x6, 0x7, @perf_config_ext={0x0, 0xffffffffffffffc1}, 0x20, 0x401, 0x5, 0x0, 0xfffffffffffffffb, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x0, 0x6, &(0x7f0000001980)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x7, 0x1, 0x0, 0xffffffffffffff9c}, @alu={0x7, 0x5, 0x7, 0x5, 0xf, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0x1d}], &(0x7f00000019c0)='syzkaller\x00', 0x1, 0xa1, &(0x7f0000001a00)=""/161, 0x41f00, 0x1, [], 0x0, 0xd, 0xffffffffffffff9c, 0x8, &(0x7f0000001ac0)={0x9, 0x8000}, 0x8, 0x10, &(0x7f0000001b00)={0x80000000, 0x1, 0xffffffffffffffff}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r2, 0x0, 0x37, 0x0, &(0x7f0000001bc0)="eaffb5ea43ba6537028790a00400fd18396e4b256b58e96d04643b1c5f724460d70b63a9db5037f4db5048821b7aa522f447f5574e73dc", 0x0, 0xffff}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)) recvmsg$kcm(r1, &(0x7f00000018c0)={&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f0000001800)=[{&(0x7f00000002c0)=""/203, 0xcb}, {&(0x7f0000000080)=""/40, 0x28}, {0x0}, {&(0x7f0000000480)=""/134, 0x86}, {&(0x7f0000000540)=""/237, 0xed}, {&(0x7f0000000640)=""/24, 0x18}, {&(0x7f0000000680)=""/201, 0xc9}, {&(0x7f0000000780)=""/4096, 0x1000}, {0x0}], 0x9}, 0x0) getpid() 04:11:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x0) socket$kcm(0x29, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000140)=@ax25={{0x3, @netrom}, [@default, @remote, @rose, @netrom, @default, @rose, @null, @rose]}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/75, 0x4b}], 0x1, &(0x7f0000000300)=""/2, 0x2}, 0x12001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x10000) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x7}, 0x80, 0x0}, 0x20004040) 04:11:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 04:11:44 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00003c9733f5f087110008abca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702000000000000", 0x39}], 0x1}, 0x0) gettid() perf_event_open(&(0x7f0000001900)={0x7, 0x70, 0xfffffffffffff444, 0x400, 0x0, 0xe0, 0x0, 0x37, 0x40002, 0x5, 0x8, 0x8001, 0x9998, 0x100000000, 0x0, 0x3, 0x4, 0x5, 0x7, 0xcd, 0x2, 0x7fff, 0x1, 0x1, 0x0, 0x0, 0x81, 0xc2, 0x0, 0x7, 0x1, 0x860, 0x5, 0x2, 0xffffffffffffff81, 0x5, 0x9, 0x40, 0x0, 0x6, 0x7, @perf_config_ext={0x0, 0xffffffffffffffc1}, 0x20, 0x401, 0x5, 0x0, 0xfffffffffffffffb, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x0, 0x6, &(0x7f0000001980)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x7, 0x1, 0x0, 0xffffffffffffff9c}, @alu={0x7, 0x5, 0x7, 0x5, 0xf, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0x1d}], &(0x7f00000019c0)='syzkaller\x00', 0x1, 0xa1, &(0x7f0000001a00)=""/161, 0x41f00, 0x1, [], 0x0, 0xd, 0xffffffffffffff9c, 0x8, &(0x7f0000001ac0)={0x9, 0x8000}, 0x8, 0x10, &(0x7f0000001b00)={0x80000000, 0x1, 0xffffffffffffffff}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r2, 0x0, 0x37, 0x0, &(0x7f0000001bc0)="eaffb5ea43ba6537028790a00400fd18396e4b256b58e96d04643b1c5f724460d70b63a9db5037f4db5048821b7aa522f447f5574e73dc", 0x0, 0xffff}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)) recvmsg$kcm(r1, &(0x7f00000018c0)={&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f0000001800)=[{&(0x7f00000002c0)=""/203, 0xcb}, {&(0x7f0000000080)=""/40, 0x28}, {0x0}, {&(0x7f0000000480)=""/134, 0x86}, {&(0x7f0000000540)=""/237, 0xed}, {&(0x7f0000000640)=""/24, 0x18}, {&(0x7f0000000680)=""/201, 0xc9}, {&(0x7f0000000780)=""/4096, 0x1000}, {0x0}], 0x9}, 0x0) getpid() 04:11:44 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00003c9733f5f087110008abca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702000000000000", 0x39}], 0x1}, 0x0) gettid() perf_event_open(&(0x7f0000001900)={0x7, 0x70, 0xfffffffffffff444, 0x400, 0x0, 0xe0, 0x0, 0x37, 0x40002, 0x5, 0x8, 0x8001, 0x9998, 0x100000000, 0x0, 0x3, 0x4, 0x5, 0x7, 0xcd, 0x2, 0x7fff, 0x1, 0x1, 0x0, 0x0, 0x81, 0xc2, 0x0, 0x7, 0x1, 0x860, 0x5, 0x2, 0xffffffffffffff81, 0x5, 0x9, 0x40, 0x0, 0x6, 0x7, @perf_config_ext={0x0, 0xffffffffffffffc1}, 0x20, 0x401, 0x5, 0x0, 0xfffffffffffffffb, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x0, 0x6, &(0x7f0000001980)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x7, 0x1, 0x0, 0xffffffffffffff9c}, @alu={0x7, 0x5, 0x7, 0x5, 0xf, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0x1d}], &(0x7f00000019c0)='syzkaller\x00', 0x1, 0xa1, &(0x7f0000001a00)=""/161, 0x41f00, 0x1, [], 0x0, 0xd, 0xffffffffffffff9c, 0x8, &(0x7f0000001ac0)={0x9, 0x8000}, 0x8, 0x10, &(0x7f0000001b00)={0x80000000, 0x1, 0xffffffffffffffff}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r2, 0x0, 0x37, 0x0, &(0x7f0000001bc0)="eaffb5ea43ba6537028790a00400fd18396e4b256b58e96d04643b1c5f724460d70b63a9db5037f4db5048821b7aa522f447f5574e73dc", 0x0, 0xffff}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)) recvmsg$kcm(r1, &(0x7f00000018c0)={&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f0000001800)=[{&(0x7f00000002c0)=""/203, 0xcb}, {&(0x7f0000000080)=""/40, 0x28}, {0x0}, {&(0x7f0000000480)=""/134, 0x86}, {&(0x7f0000000540)=""/237, 0xed}, {&(0x7f0000000640)=""/24, 0x18}, {&(0x7f0000000680)=""/201, 0xc9}, {&(0x7f0000000780)=""/4096, 0x1000}, {0x0}], 0x9}, 0x0) getpid() 04:11:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x0) socket$kcm(0x29, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000140)=@ax25={{0x3, @netrom}, [@default, @remote, @rose, @netrom, @default, @rose, @null, @rose]}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/75, 0x4b}], 0x1, &(0x7f0000000300)=""/2, 0x2}, 0x12001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x10000) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x7}, 0x80, 0x0}, 0x20004040) 04:11:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x54}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x35}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 04:11:44 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00003c9733f5f087110008abca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702000000000000", 0x39}], 0x1}, 0x0) gettid() perf_event_open(&(0x7f0000001900)={0x7, 0x70, 0xfffffffffffff444, 0x400, 0x0, 0xe0, 0x0, 0x37, 0x40002, 0x5, 0x8, 0x8001, 0x9998, 0x100000000, 0x0, 0x3, 0x4, 0x5, 0x7, 0xcd, 0x2, 0x7fff, 0x1, 0x1, 0x0, 0x0, 0x81, 0xc2, 0x0, 0x7, 0x1, 0x860, 0x5, 0x2, 0xffffffffffffff81, 0x5, 0x9, 0x40, 0x0, 0x6, 0x7, @perf_config_ext={0x0, 0xffffffffffffffc1}, 0x20, 0x401, 0x5, 0x0, 0xfffffffffffffffb, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x0, 0x6, &(0x7f0000001980)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x7, 0x1, 0x0, 0xffffffffffffff9c}, @alu={0x7, 0x5, 0x7, 0x5, 0xf, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0x1d}], &(0x7f00000019c0)='syzkaller\x00', 0x1, 0xa1, &(0x7f0000001a00)=""/161, 0x41f00, 0x1, [], 0x0, 0xd, 0xffffffffffffff9c, 0x8, &(0x7f0000001ac0)={0x9, 0x8000}, 0x8, 0x10, &(0x7f0000001b00)={0x80000000, 0x1, 0xffffffffffffffff}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r2, 0x0, 0x37, 0x0, &(0x7f0000001bc0)="eaffb5ea43ba6537028790a00400fd18396e4b256b58e96d04643b1c5f724460d70b63a9db5037f4db5048821b7aa522f447f5574e73dc", 0x0, 0xffff}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)) recvmsg$kcm(r1, &(0x7f00000018c0)={&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f0000001800)=[{&(0x7f00000002c0)=""/203, 0xcb}, {&(0x7f0000000080)=""/40, 0x28}, {0x0}, {&(0x7f0000000480)=""/134, 0x86}, {&(0x7f0000000540)=""/237, 0xed}, {&(0x7f0000000640)=""/24, 0x18}, {&(0x7f0000000680)=""/201, 0xc9}, {&(0x7f0000000780)=""/4096, 0x1000}, {0x0}], 0x9}, 0x0) getpid() 04:11:44 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00003c9733f5f087110008abca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702000000000000", 0x39}], 0x1}, 0x0) gettid() perf_event_open(&(0x7f0000001900)={0x7, 0x70, 0xfffffffffffff444, 0x400, 0x0, 0xe0, 0x0, 0x37, 0x40002, 0x5, 0x8, 0x8001, 0x9998, 0x100000000, 0x0, 0x3, 0x4, 0x5, 0x7, 0xcd, 0x2, 0x7fff, 0x1, 0x1, 0x0, 0x0, 0x81, 0xc2, 0x0, 0x7, 0x1, 0x860, 0x5, 0x2, 0xffffffffffffff81, 0x5, 0x9, 0x40, 0x0, 0x6, 0x7, @perf_config_ext={0x0, 0xffffffffffffffc1}, 0x20, 0x401, 0x5, 0x0, 0xfffffffffffffffb, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x0, 0x6, &(0x7f0000001980)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x7, 0x1, 0x0, 0xffffffffffffff9c}, @alu={0x7, 0x5, 0x7, 0x5, 0xf, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0x1d}], &(0x7f00000019c0)='syzkaller\x00', 0x1, 0xa1, &(0x7f0000001a00)=""/161, 0x41f00, 0x1, [], 0x0, 0xd, 0xffffffffffffff9c, 0x8, &(0x7f0000001ac0)={0x9, 0x8000}, 0x8, 0x10, &(0x7f0000001b00)={0x80000000, 0x1, 0xffffffffffffffff}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r2, 0x0, 0x37, 0x0, &(0x7f0000001bc0)="eaffb5ea43ba6537028790a00400fd18396e4b256b58e96d04643b1c5f724460d70b63a9db5037f4db5048821b7aa522f447f5574e73dc", 0x0, 0xffff}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)) recvmsg$kcm(r1, &(0x7f00000018c0)={&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f0000001800)=[{&(0x7f00000002c0)=""/203, 0xcb}, {&(0x7f0000000080)=""/40, 0x28}, {0x0}, {&(0x7f0000000480)=""/134, 0x86}, {&(0x7f0000000540)=""/237, 0xed}, {&(0x7f0000000640)=""/24, 0x18}, {&(0x7f0000000680)=""/201, 0xc9}, {&(0x7f0000000780)=""/4096, 0x1000}, {0x0}], 0x9}, 0x0) getpid() 04:11:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 04:11:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000004c0)=""/255, 0xff}], 0x1, &(0x7f0000000980)=""/101, 0x65}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) close(r0) 04:11:44 executing program 3: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000340)=r5, 0x4) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r2, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 04:11:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000580)=""/104, 0x68}, {&(0x7f0000000940)=""/156, 0x9c}], 0x3}, 0x40000000) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x8, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="2869fbe23a6484e09601c1ccb0a10b0000000000000000000004f3dfab427308cd4fc2bcd1a35cf4e97c1db88979b925dc04a12d8b6e62df7523560b5c7546162f6e47901a2565fc251ca8dbed9f76407903ac0513e6bfad674828f487c80685adadc787e8"]) socketpair(0x9, 0x5, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 04:11:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 04:11:44 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 04:11:44 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00003c9733f5f087110008abca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702000000000000", 0x39}], 0x1}, 0x0) gettid() perf_event_open(&(0x7f0000001900)={0x7, 0x70, 0xfffffffffffff444, 0x400, 0x0, 0xe0, 0x0, 0x37, 0x40002, 0x5, 0x8, 0x8001, 0x9998, 0x100000000, 0x0, 0x3, 0x4, 0x5, 0x7, 0xcd, 0x2, 0x7fff, 0x1, 0x1, 0x0, 0x0, 0x81, 0xc2, 0x0, 0x7, 0x1, 0x860, 0x5, 0x2, 0xffffffffffffff81, 0x5, 0x9, 0x40, 0x0, 0x6, 0x7, @perf_config_ext={0x0, 0xffffffffffffffc1}, 0x20, 0x401, 0x5, 0x0, 0xfffffffffffffffb, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x0, 0x6, &(0x7f0000001980)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x7, 0x1, 0x0, 0xffffffffffffff9c}, @alu={0x7, 0x5, 0x7, 0x5, 0xf, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0x1d}], &(0x7f00000019c0)='syzkaller\x00', 0x1, 0xa1, &(0x7f0000001a00)=""/161, 0x41f00, 0x1, [], 0x0, 0xd, 0xffffffffffffff9c, 0x8, &(0x7f0000001ac0)={0x9, 0x8000}, 0x8, 0x10, &(0x7f0000001b00)={0x80000000, 0x1, 0xffffffffffffffff}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r2, 0x0, 0x37, 0x0, &(0x7f0000001bc0)="eaffb5ea43ba6537028790a00400fd18396e4b256b58e96d04643b1c5f724460d70b63a9db5037f4db5048821b7aa522f447f5574e73dc", 0x0, 0xffff}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)) recvmsg$kcm(r1, &(0x7f00000018c0)={&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f0000001800)=[{&(0x7f00000002c0)=""/203, 0xcb}, {&(0x7f0000000080)=""/40, 0x28}, {0x0}, {&(0x7f0000000480)=""/134, 0x86}, {&(0x7f0000000540)=""/237, 0xed}, {&(0x7f0000000640)=""/24, 0x18}, {&(0x7f0000000680)=""/201, 0xc9}, {&(0x7f0000000780)=""/4096, 0x1000}, {0x0}], 0x9}, 0x0) getpid() [ 243.747333][ T9605] device nr0 entered promiscuous mode 04:11:44 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00003c9733f5f087110008abca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702000000000000", 0x39}], 0x1}, 0x0) gettid() perf_event_open(&(0x7f0000001900)={0x7, 0x70, 0xfffffffffffff444, 0x400, 0x0, 0xe0, 0x0, 0x37, 0x40002, 0x5, 0x8, 0x8001, 0x9998, 0x100000000, 0x0, 0x3, 0x4, 0x5, 0x7, 0xcd, 0x2, 0x7fff, 0x1, 0x1, 0x0, 0x0, 0x81, 0xc2, 0x0, 0x7, 0x1, 0x860, 0x5, 0x2, 0xffffffffffffff81, 0x5, 0x9, 0x40, 0x0, 0x6, 0x7, @perf_config_ext={0x0, 0xffffffffffffffc1}, 0x20, 0x401, 0x5, 0x0, 0xfffffffffffffffb, 0x7, 0x7fffffff}, 0x0, 0xffffffffffffffff, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x0, 0x6, &(0x7f0000001980)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x7, 0x1, 0x0, 0xffffffffffffff9c}, @alu={0x7, 0x5, 0x7, 0x5, 0xf, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0x1d}], &(0x7f00000019c0)='syzkaller\x00', 0x1, 0xa1, &(0x7f0000001a00)=""/161, 0x41f00, 0x1, [], 0x0, 0xd, 0xffffffffffffff9c, 0x8, &(0x7f0000001ac0)={0x9, 0x8000}, 0x8, 0x10, &(0x7f0000001b00)={0x80000000, 0x1, 0xffffffffffffffff}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r2, 0x0, 0x37, 0x0, &(0x7f0000001bc0)="eaffb5ea43ba6537028790a00400fd18396e4b256b58e96d04643b1c5f724460d70b63a9db5037f4db5048821b7aa522f447f5574e73dc", 0x0, 0xffff}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)) recvmsg$kcm(r1, &(0x7f00000018c0)={&(0x7f0000000100)=@nl=@proc, 0x80, &(0x7f0000001800)=[{&(0x7f00000002c0)=""/203, 0xcb}, {&(0x7f0000000080)=""/40, 0x28}, {0x0}, {&(0x7f0000000480)=""/134, 0x86}, {&(0x7f0000000540)=""/237, 0xed}, {&(0x7f0000000640)=""/24, 0x18}, {&(0x7f0000000680)=""/201, 0xc9}, {&(0x7f0000000780)=""/4096, 0x1000}, {0x0}], 0x9}, 0x0) getpid() [ 243.843063][ T9607] device lo entered promiscuous mode 04:11:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x4001fd) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x801c581f, 0x20000004) 04:11:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x4001fd) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x801c581f, 0x20000004) [ 244.150229][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 244.156271][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 244.230213][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 244.237799][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:11:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x4001fd) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x801c581f, 0x20000004) 04:11:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x4001fd) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x801c581f, 0x20000004) 04:11:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x3a, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880b", 0x0}, 0x28) 04:11:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000013001707ed128064d20010002ae6a5dd80000000010880000000000300f87f0000640000000000000000", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 244.790183][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 244.796411][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 244.834569][ T9593] device nr0 entered promiscuous mode 04:11:46 executing program 3: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000340)=r5, 0x4) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r2, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 04:11:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000013001707ed128064d20010002ae6a5dd80000000010880000000000300f87f0000640000000000000000", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:11:46 executing program 2: socketpair(0x0, 0x1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a00)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001a80)=""/221, 0xdd}, 0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000001c00)={0x2, 0x70, 0x2, 0x800, 0x800, 0x7, 0x0, 0x20d, 0x2, 0x4, 0x2, 0x8000, 0x3, 0x18, 0x1, 0x9, 0x9, 0x2, 0x9, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4, 0x4, 0x1000, 0x6, 0x5, 0x1, 0x8001, 0x52, 0x80000000, 0x2, 0x0, 0x1, 0x0, 0xc776, 0x0, 0x9, 0x2, @perf_bp={0x0}, 0x400, 0x1, 0x7ff, 0xc, 0x4, 0x7, 0x492}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) socketpair(0x17, 0x0, 0x1000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@generic, 0x80, &(0x7f0000000100)=[{&(0x7f0000000340)=""/192, 0xc0}], 0x1, &(0x7f0000000400)=""/208, 0xd0}, 0x2) 04:11:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000580)=""/104, 0x68}, {&(0x7f0000000940)=""/156, 0x9c}], 0x3}, 0x40000000) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x8, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="2869fbe23a6484e09601c1ccb0a10b0000000000000000000004f3dfab427308cd4fc2bcd1a35cf4e97c1db88979b925dc04a12d8b6e62df7523560b5c7546162f6e47901a2565fc251ca8dbed9f76407903ac0513e6bfad674828f487c80685adadc787e8"]) socketpair(0x9, 0x5, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 04:11:46 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) sendmsg$kcm(r0, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="0f6d6f93a7c40020"], 0x8) 04:11:46 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) [ 245.190184][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 245.196078][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:11:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000013001707ed128064d20010002ae6a5dd80000000010880000000000300f87f0000640000000000000000", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:11:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000580)=""/104, 0x68}, {&(0x7f0000000940)=""/156, 0x9c}], 0x3}, 0x40000000) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x8, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="2869fbe23a6484e09601c1ccb0a10b0000000000000000000004f3dfab427308cd4fc2bcd1a35cf4e97c1db88979b925dc04a12d8b6e62df7523560b5c7546162f6e47901a2565fc251ca8dbed9f76407903ac0513e6bfad674828f487c80685adadc787e8"]) socketpair(0x9, 0x5, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 04:11:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000013001707ed128064d20010002ae6a5dd80000000010880000000000300f87f0000640000000000000000", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 245.643169][ T9679] device nr0 entered promiscuous mode [ 245.668252][ T26] audit: type=1804 audit(1558498306.548:44): pid=9660 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir203138709/syzkaller.8GZwAv/23/memory.events" dev="sda1" ino=16132 res=1 [ 245.761567][ T26] audit: type=1800 audit(1558498306.548:45): pid=9660 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16132 res=0 04:11:46 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) sendmsg$kcm(r0, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="0f6d6f93a7c40020"], 0x8) 04:11:46 executing program 2: socketpair(0x0, 0x1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a00)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001a80)=""/221, 0xdd}, 0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000001c00)={0x2, 0x70, 0x2, 0x800, 0x800, 0x7, 0x0, 0x20d, 0x2, 0x4, 0x2, 0x8000, 0x3, 0x18, 0x1, 0x9, 0x9, 0x2, 0x9, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4, 0x4, 0x1000, 0x6, 0x5, 0x1, 0x8001, 0x52, 0x80000000, 0x2, 0x0, 0x1, 0x0, 0xc776, 0x0, 0x9, 0x2, @perf_bp={0x0}, 0x400, 0x1, 0x7ff, 0xc, 0x4, 0x7, 0x492}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) socketpair(0x17, 0x0, 0x1000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@generic, 0x80, &(0x7f0000000100)=[{&(0x7f0000000340)=""/192, 0xc0}], 0x1, &(0x7f0000000400)=""/208, 0xd0}, 0x2) [ 245.886518][ T26] audit: type=1804 audit(1558498306.768:46): pid=9677 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir203138709/syzkaller.8GZwAv/23/memory.events" dev="sda1" ino=16132 res=1 04:11:46 executing program 0: socketpair(0x0, 0x1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a00)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001a80)=""/221, 0xdd}, 0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000001c00)={0x2, 0x70, 0x2, 0x800, 0x800, 0x7, 0x0, 0x20d, 0x2, 0x4, 0x2, 0x8000, 0x3, 0x18, 0x1, 0x9, 0x9, 0x2, 0x9, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4, 0x4, 0x1000, 0x6, 0x5, 0x1, 0x8001, 0x52, 0x80000000, 0x2, 0x0, 0x1, 0x0, 0xc776, 0x0, 0x9, 0x2, @perf_bp={0x0}, 0x400, 0x1, 0x7ff, 0xc, 0x4, 0x7, 0x492}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) socketpair(0x17, 0x0, 0x1000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@generic, 0x80, &(0x7f0000000100)=[{&(0x7f0000000340)=""/192, 0xc0}], 0x1, &(0x7f0000000400)=""/208, 0xd0}, 0x2) [ 246.078520][ T26] audit: type=1800 audit(1558498306.768:47): pid=9677 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16132 res=0 [ 246.230654][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 246.238074][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:11:47 executing program 3: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000340)=r5, 0x4) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r2, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 04:11:47 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 04:11:47 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) sendmsg$kcm(r0, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="0f6d6f93a7c40020"], 0x8) 04:11:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000580)=""/104, 0x68}, {&(0x7f0000000940)=""/156, 0x9c}], 0x3}, 0x40000000) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x8, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="2869fbe23a6484e09601c1ccb0a10b0000000000000000000004f3dfab427308cd4fc2bcd1a35cf4e97c1db88979b925dc04a12d8b6e62df7523560b5c7546162f6e47901a2565fc251ca8dbed9f76407903ac0513e6bfad674828f487c80685adadc787e8"]) socketpair(0x9, 0x5, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 04:11:48 executing program 2: socketpair(0x0, 0x1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a00)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001a80)=""/221, 0xdd}, 0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000001c00)={0x2, 0x70, 0x2, 0x800, 0x800, 0x7, 0x0, 0x20d, 0x2, 0x4, 0x2, 0x8000, 0x3, 0x18, 0x1, 0x9, 0x9, 0x2, 0x9, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4, 0x4, 0x1000, 0x6, 0x5, 0x1, 0x8001, 0x52, 0x80000000, 0x2, 0x0, 0x1, 0x0, 0xc776, 0x0, 0x9, 0x2, @perf_bp={0x0}, 0x400, 0x1, 0x7ff, 0xc, 0x4, 0x7, 0x492}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) socketpair(0x17, 0x0, 0x1000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@generic, 0x80, &(0x7f0000000100)=[{&(0x7f0000000340)=""/192, 0xc0}], 0x1, &(0x7f0000000400)=""/208, 0xd0}, 0x2) [ 247.126257][ T26] audit: type=1800 audit(1558498308.008:48): pid=9708 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16145 res=0 04:11:48 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 04:11:48 executing program 0: socketpair(0x0, 0x1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a00)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001a80)=""/221, 0xdd}, 0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000001c00)={0x2, 0x70, 0x2, 0x800, 0x800, 0x7, 0x0, 0x20d, 0x2, 0x4, 0x2, 0x8000, 0x3, 0x18, 0x1, 0x9, 0x9, 0x2, 0x9, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4, 0x4, 0x1000, 0x6, 0x5, 0x1, 0x8001, 0x52, 0x80000000, 0x2, 0x0, 0x1, 0x0, 0xc776, 0x0, 0x9, 0x2, @perf_bp={0x0}, 0x400, 0x1, 0x7ff, 0xc, 0x4, 0x7, 0x492}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) socketpair(0x17, 0x0, 0x1000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@generic, 0x80, &(0x7f0000000100)=[{&(0x7f0000000340)=""/192, 0xc0}], 0x1, &(0x7f0000000400)=""/208, 0xd0}, 0x2) [ 247.342484][ T26] audit: type=1804 audit(1558498308.228:49): pid=9711 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir682827918/syzkaller.43bxQs/37/memory.events" dev="sda1" ino=16161 res=1 [ 247.437936][ T26] audit: type=1800 audit(1558498308.228:50): pid=9711 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16161 res=0 [ 247.553874][ T9720] device nr0 entered promiscuous mode 04:11:48 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) sendmsg$kcm(r0, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="0f6d6f93a7c40020"], 0x8) 04:11:48 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) sendmsg$kcm(r0, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="0f6d6f93a7c40020"], 0x8) [ 247.910750][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 247.917180][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:11:49 executing program 5: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000340)=r5, 0x4) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r2, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 04:11:49 executing program 2: socketpair(0x0, 0x1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a00)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001a80)=""/221, 0xdd}, 0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000001c00)={0x2, 0x70, 0x2, 0x800, 0x800, 0x7, 0x0, 0x20d, 0x2, 0x4, 0x2, 0x8000, 0x3, 0x18, 0x1, 0x9, 0x9, 0x2, 0x9, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4, 0x4, 0x1000, 0x6, 0x5, 0x1, 0x8001, 0x52, 0x80000000, 0x2, 0x0, 0x1, 0x0, 0xc776, 0x0, 0x9, 0x2, @perf_bp={0x0}, 0x400, 0x1, 0x7ff, 0xc, 0x4, 0x7, 0x492}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) socketpair(0x17, 0x0, 0x1000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@generic, 0x80, &(0x7f0000000100)=[{&(0x7f0000000340)=""/192, 0xc0}], 0x1, &(0x7f0000000400)=""/208, 0xd0}, 0x2) [ 248.367412][ T26] audit: type=1804 audit(1558498309.248:51): pid=9739 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir203138709/syzkaller.8GZwAv/25/memory.events" dev="sda1" ino=16148 res=1 04:11:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x400000009, 0x3, 0xcc, 0x9}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000080), 0x0}, 0x18) [ 248.488918][ T9761] device nr0 entered promiscuous mode 04:11:49 executing program 3: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000340)=r5, 0x4) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r2, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 04:11:49 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) sendmsg$kcm(r0, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="0f6d6f93a7c40020"], 0x8) [ 248.561793][ T26] audit: type=1800 audit(1558498309.248:52): pid=9739 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16148 res=0 04:11:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x829, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x10, 0x2, 0x0) close(r0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e001000"/46, 0x2e}], 0x1}, 0x0) [ 248.686860][ T26] audit: type=1800 audit(1558498309.568:53): pid=9751 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16161 res=0 04:11:49 executing program 0: socketpair(0x0, 0x1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a00)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001a80)=""/221, 0xdd}, 0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000001c00)={0x2, 0x70, 0x2, 0x800, 0x800, 0x7, 0x0, 0x20d, 0x2, 0x4, 0x2, 0x8000, 0x3, 0x18, 0x1, 0x9, 0x9, 0x2, 0x9, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4, 0x4, 0x1000, 0x6, 0x5, 0x1, 0x8001, 0x52, 0x80000000, 0x2, 0x0, 0x1, 0x0, 0xc776, 0x0, 0x9, 0x2, @perf_bp={0x0}, 0x400, 0x1, 0x7ff, 0xc, 0x4, 0x7, 0x492}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) socketpair(0x17, 0x0, 0x1000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@generic, 0x80, &(0x7f0000000100)=[{&(0x7f0000000340)=""/192, 0xc0}], 0x1, &(0x7f0000000400)=""/208, 0xd0}, 0x2) 04:11:50 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) sendmsg$kcm(r0, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="0f6d6f93a7c40020"], 0x8) [ 249.190781][ T9777] IPv6: NLM_F_CREATE should be specified when creating new route [ 249.286780][ T9780] device nr0 entered promiscuous mode 04:11:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x829, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x10, 0x2, 0x0) close(r0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e001000"/46, 0x2e}], 0x1}, 0x0) [ 249.350348][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 249.356311][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:11:50 executing program 5: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000340)=r5, 0x4) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r2, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 04:11:50 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r5 = gettid() write$cgroup_pid(r4, &(0x7f0000000500)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x89f) write$cgroup_int(r7, 0x0, 0x0) [ 249.895940][ T9810] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 249.925429][ T9810] CPU: 0 PID: 9810 Comm: syz-executor.2 Not tainted 5.2.0-rc1+ #1 [ 249.934116][ T9810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.946499][ T9810] Call Trace: [ 249.949889][ T9810] dump_stack+0x172/0x1f0 [ 249.949909][ T9810] dump_header+0x10f/0xb6c [ 249.949925][ T9810] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 249.949941][ T9810] ? ___ratelimit+0x60/0x595 [ 249.949959][ T9810] oom_kill_process.cold+0x10/0x15 [ 249.958911][ T9810] out_of_memory+0x79a/0x1280 [ 249.958932][ T9810] ? __sched_text_start+0x8/0x8 [ 249.958951][ T9810] ? oom_killer_disable+0x280/0x280 [ 249.989787][ T9810] mem_cgroup_out_of_memory+0x1ca/0x230 [ 249.995467][ T9810] ? memcg_event_wake+0x230/0x230 [ 250.000524][ T9810] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 250.006629][ T9810] ? cgroup_file_notify+0x140/0x1b0 [ 250.011852][ T9810] memory_max_write+0x169/0x300 [ 250.016708][ T9810] ? mem_cgroup_write+0x360/0x360 [ 250.021298][ T9804] device nr0 entered promiscuous mode [ 250.021824][ T9810] ? cgroup_file_write+0x86/0x790 [ 250.032477][ T9810] cgroup_file_write+0x241/0x790 [ 250.032496][ T9810] ? mem_cgroup_write+0x360/0x360 [ 250.032508][ T9810] ? kill_css+0x380/0x380 [ 250.032527][ T9810] ? kill_css+0x380/0x380 [ 250.032540][ T9810] kernfs_fop_write+0x2b8/0x480 [ 250.032558][ T9810] __vfs_write+0x8a/0x110 [ 250.042865][ T9810] ? kernfs_fop_open+0xd80/0xd80 [ 250.042885][ T9810] vfs_write+0x20c/0x580 [ 250.063675][ T9810] ksys_write+0x14f/0x290 [ 250.063691][ T9810] ? __ia32_sys_read+0xb0/0xb0 [ 250.063707][ T9810] ? do_syscall_64+0x26/0x680 [ 250.063721][ T9810] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.063732][ T9810] ? do_syscall_64+0x26/0x680 [ 250.063750][ T9810] __x64_sys_write+0x73/0xb0 [ 250.089578][ T9810] do_syscall_64+0xfd/0x680 [ 250.106781][ T9810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.106799][ T9810] RIP: 0033:0x459279 [ 250.122343][ T9810] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:11:51 executing program 3: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='notify_on_release\x00') r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000480)='cpuset.memory_pressure\x00', 0x0, 0x0) r5 = gettid() openat$cgroup_ro(r4, &(0x7f0000000580)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r4, &(0x7f00000004c0)=r5, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={r3, 0x7, 0x1, 0x400, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000000c0)='notify_on_release\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.swap.current\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={r7}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) r9 = socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x20) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000540)={r9}) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x3, 0x3, 0x1000, 0x0, 0xffffffffffffffff, 0x9000, 0x0, 0x10001, 0x3, 0x5, 0x93ec, 0x400, 0x8, 0xf0, 0x3a, 0x0, 0x9, 0x100000001, 0x6, 0x400000, 0x0, 0x10000, 0xc31b, 0xffffffff, 0x8001, 0x0, 0x2, 0x37, 0xcf8, 0x0, 0x7, 0xfff, 0x4, 0x1677, 0xfffffffffffffffc, 0x0, 0x3, 0x4, @perf_config_ext={0x800, 0xff}, 0x4004, 0xd3, 0x8000, 0x0, 0x0, 0x10000}, r10, 0xa, r2, 0x2) openat$cgroup_ro(r7, &(0x7f0000000500)='pids.events\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r8, 0x800454d3, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="00706964732061202d6d656d6f72792000aa6f20"], 0x14) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x0, 0x0, "b6bc8fda04ae1bf1a1e4431ff3e4e210a9ad83a2709b87b524875076871471eb7b6e745475d5febe321ff3eb7a90f27b92d384bf15cacfa784201efd3d604b"}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f0000000000)) 04:11:51 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x3c) close(r0) 04:11:51 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f0000000140)=r0, 0x1e4) [ 250.142490][ T9810] RSP: 002b:00007f9b19b14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 250.150921][ T9810] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 250.158911][ T9810] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 250.166995][ T9810] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 250.174989][ T9810] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9b19b156d4 [ 250.182974][ T9810] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 250.212497][ T9810] memory: usage 4668kB, limit 0kB, failcnt 46 04:11:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x829, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x10, 0x2, 0x0) close(r0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e001000"/46, 0x2e}], 0x1}, 0x0) [ 250.260439][ T9810] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 250.268206][ T9810] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 04:11:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x6, 0x2, 0x0, 0x1}, 0xfc) 04:11:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000002b008151e00f80ecdb4cb904034865160b000100050a0000000009000e0015001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) [ 250.393696][ T9810] Memory cgroup stats for /syz2: cache:0KB rss:2288KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2216KB inactive_file:0KB active_file:0KB unevictable:0KB 04:11:51 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xd, &(0x7f0000000180), 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 04:11:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x11, 0x2, 0x300) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x2002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) [ 250.498201][ T9810] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=9809,uid=0 [ 250.599288][ T9810] Memory cgroup out of memory: Killed process 9809 (syz-executor.2) total-vm:72708kB, anon-rss:2144kB, file-rss:34816kB, shmem-rss:0kB 04:11:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x829, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x10, 0x2, 0x0) close(r0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e001000"/46, 0x2e}], 0x1}, 0x0) 04:11:51 executing program 5: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000340)=r5, 0x4) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r2, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 04:11:51 executing program 3: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='notify_on_release\x00') r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000480)='cpuset.memory_pressure\x00', 0x0, 0x0) r5 = gettid() openat$cgroup_ro(r4, &(0x7f0000000580)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r4, &(0x7f00000004c0)=r5, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={r3, 0x7, 0x1, 0x400, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000000c0)='notify_on_release\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.swap.current\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={r7}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) r9 = socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x20) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000540)={r9}) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x3, 0x3, 0x1000, 0x0, 0xffffffffffffffff, 0x9000, 0x0, 0x10001, 0x3, 0x5, 0x93ec, 0x400, 0x8, 0xf0, 0x3a, 0x0, 0x9, 0x100000001, 0x6, 0x400000, 0x0, 0x10000, 0xc31b, 0xffffffff, 0x8001, 0x0, 0x2, 0x37, 0xcf8, 0x0, 0x7, 0xfff, 0x4, 0x1677, 0xfffffffffffffffc, 0x0, 0x3, 0x4, @perf_config_ext={0x800, 0xff}, 0x4004, 0xd3, 0x8000, 0x0, 0x0, 0x10000}, r10, 0xa, r2, 0x2) openat$cgroup_ro(r7, &(0x7f0000000500)='pids.events\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r8, 0x800454d3, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="00706964732061202d6d656d6f72792000aa6f20"], 0x14) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x0, 0x0, "b6bc8fda04ae1bf1a1e4431ff3e4e210a9ad83a2709b87b524875076871471eb7b6e745475d5febe321ff3eb7a90f27b92d384bf15cacfa784201efd3d604b"}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f0000000000)) [ 250.716326][ T1042] oom_reaper: reaped process 9809 (syz-executor.2), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB [ 250.753846][ T9841] sctp: [Deprecated]: syz-executor.0 (pid 9841) Use of int in maxseg socket option. [ 250.753846][ T9841] Use struct sctp_assoc_value instead 04:11:51 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r5 = gettid() write$cgroup_pid(r4, &(0x7f0000000500)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x89f) write$cgroup_int(r7, 0x0, 0x0) [ 250.886037][ T9849] sctp: [Deprecated]: syz-executor.0 (pid 9849) Use of int in maxseg socket option. [ 250.886037][ T9849] Use struct sctp_assoc_value instead [ 250.923630][ T8826] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 04:11:51 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r5 = gettid() write$cgroup_pid(r4, &(0x7f0000000500)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x89f) write$cgroup_int(r7, 0x0, 0x0) [ 251.020695][ T8826] CPU: 0 PID: 8826 Comm: syz-executor.2 Not tainted 5.2.0-rc1+ #1 [ 251.028900][ T8826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.039403][ T8826] Call Trace: [ 251.042747][ T8826] dump_stack+0x172/0x1f0 [ 251.047194][ T8826] dump_header+0x10f/0xb6c [ 251.051785][ T8826] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 251.057881][ T8826] ? ___ratelimit+0x60/0x595 [ 251.062584][ T8826] ? do_raw_spin_unlock+0x57/0x270 [ 251.068281][ T8826] oom_kill_process.cold+0x10/0x15 [ 251.074257][ T8826] out_of_memory+0x79a/0x1280 [ 251.078956][ T8826] ? lock_downgrade+0x880/0x880 [ 251.083921][ T8826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 251.090409][ T8826] ? oom_killer_disable+0x280/0x280 [ 251.095723][ T8826] ? find_held_lock+0x35/0x130 [ 251.100951][ T8826] mem_cgroup_out_of_memory+0x1ca/0x230 [ 251.100968][ T8826] ? memcg_event_wake+0x230/0x230 [ 251.100991][ T8826] ? do_raw_spin_unlock+0x57/0x270 04:11:52 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r5 = gettid() write$cgroup_pid(r4, &(0x7f0000000500)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x89f) write$cgroup_int(r7, 0x0, 0x0) [ 251.101012][ T8826] ? _raw_spin_unlock+0x2d/0x50 [ 251.123624][ T8826] try_charge+0x102c/0x15c0 [ 251.123641][ T8826] ? find_held_lock+0x35/0x130 [ 251.123668][ T8826] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 251.123689][ T8826] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 251.133769][ T8826] ? find_held_lock+0x35/0x130 [ 251.133786][ T8826] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 251.133811][ T8826] __memcg_kmem_charge_memcg+0x7c/0x130 [ 251.133828][ T8826] ? memcg_kmem_put_cache+0xb0/0xb0 [ 251.133846][ T8826] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 251.133864][ T8826] __memcg_kmem_charge+0x136/0x300 [ 251.133882][ T8826] __alloc_pages_nodemask+0x4bd/0x8d0 [ 251.133897][ T8826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 251.133914][ T8826] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 251.133932][ T8826] ? copy_process.part.0+0x43f7/0x6790 [ 251.133947][ T8826] ? lockdep_hardirqs_on+0x418/0x5d0 [ 251.133964][ T8826] ? trace_hardirqs_on+0x67/0x220 [ 251.133976][ T8826] ? kasan_check_read+0x11/0x20 [ 251.133996][ T8826] copy_process.part.0+0x4a0/0x6790 [ 251.134013][ T8826] ? __might_fault+0x12b/0x1e0 [ 251.134035][ T8826] ? __cleanup_sighand+0x60/0x60 [ 251.134049][ T8826] ? lock_downgrade+0x880/0x880 [ 251.134074][ T8826] _do_fork+0x25d/0xfe0 [ 251.134094][ T8826] ? copy_init_mm+0x20/0x20 [ 251.134115][ T8826] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 251.134126][ T8826] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 251.134140][ T8826] ? do_syscall_64+0x26/0x680 [ 251.134155][ T8826] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.134168][ T8826] ? do_syscall_64+0x26/0x680 [ 251.134186][ T8826] __x64_sys_clone+0xbf/0x150 [ 251.134210][ T8826] do_syscall_64+0xfd/0x680 [ 251.225369][ T8826] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.225381][ T8826] RIP: 0033:0x45784a [ 251.225396][ T8826] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 251.225403][ T8826] RSP: 002b:00007ffda3949220 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 251.271910][ T8826] RAX: ffffffffffffffda RBX: 00007ffda3949220 RCX: 000000000045784a [ 251.271919][ T8826] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 251.271926][ T8826] RBP: 00007ffda3949260 R08: 0000000000000001 R09: 0000555557360940 [ 251.271933][ T8826] R10: 0000555557360c10 R11: 0000000000000246 R12: 0000000000000001 [ 251.271941][ T8826] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffda39492b0 [ 251.335009][ T8826] memory: usage 2324kB, limit 0kB, failcnt 63 [ 251.409685][ T9855] device nr0 entered promiscuous mode [ 251.530287][ T8826] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 251.543903][ T8826] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 251.567452][ T8826] Memory cgroup stats for /syz2: cache:0KB rss:68KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:128KB inactive_file:0KB active_file:0KB unevictable:0KB [ 251.596170][ T8826] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=8826,uid=0 [ 251.617550][ T8826] Memory cgroup out of memory: Killed process 8826 (syz-executor.2) total-vm:72444kB, anon-rss:96kB, file-rss:35776kB, shmem-rss:0kB [ 251.638247][ T9862] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 251.638289][ T1042] oom_reaper: reaped process 8826 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 251.656057][ T9862] CPU: 1 PID: 9862 Comm: syz-executor.0 Not tainted 5.2.0-rc1+ #1 [ 251.668987][ T9862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.679655][ T9862] Call Trace: [ 251.682961][ T9862] dump_stack+0x172/0x1f0 [ 251.687394][ T9862] dump_header+0x10f/0xb6c [ 251.691827][ T9862] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 251.697909][ T9862] ? ___ratelimit+0x60/0x595 [ 251.702501][ T9862] ? do_raw_spin_unlock+0x57/0x270 [ 251.707619][ T9862] oom_kill_process.cold+0x10/0x15 [ 251.712851][ T9862] out_of_memory+0x79a/0x1280 [ 251.717545][ T9862] ? oom_killer_disable+0x280/0x280 [ 251.722760][ T9862] mem_cgroup_out_of_memory+0x1ca/0x230 [ 251.728488][ T9862] ? memcg_event_wake+0x230/0x230 [ 251.733606][ T9862] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 251.739418][ T9862] ? cgroup_file_notify+0x140/0x1b0 [ 251.744630][ T9862] memory_max_write+0x169/0x300 [ 251.749575][ T9862] ? mem_cgroup_write+0x360/0x360 [ 251.754882][ T9862] ? lock_acquire+0x16f/0x3f0 [ 251.759749][ T9862] ? kernfs_fop_write+0x227/0x480 [ 251.764947][ T9862] cgroup_file_write+0x241/0x790 [ 251.771014][ T9862] ? mem_cgroup_write+0x360/0x360 [ 251.777744][ T9862] ? kill_css+0x380/0x380 [ 251.782064][ T9862] ? kill_css+0x380/0x380 [ 251.786998][ T9862] kernfs_fop_write+0x2b8/0x480 [ 251.792799][ T9862] __vfs_write+0x8a/0x110 [ 251.797115][ T9862] ? kernfs_fop_open+0xd80/0xd80 [ 251.802442][ T9862] vfs_write+0x20c/0x580 [ 251.806847][ T9862] ksys_write+0x14f/0x290 [ 251.811165][ T9862] ? __ia32_sys_read+0xb0/0xb0 [ 251.816021][ T9862] ? do_syscall_64+0x26/0x680 [ 251.820694][ T9862] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.827109][ T9862] ? do_syscall_64+0x26/0x680 [ 251.831793][ T9862] __x64_sys_write+0x73/0xb0 [ 251.836468][ T9862] do_syscall_64+0xfd/0x680 [ 251.840958][ T9862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.846837][ T9862] RIP: 0033:0x459279 [ 251.850742][ T9862] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 251.871376][ T9862] RSP: 002b:00007f6995a2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 251.879773][ T9862] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 251.887730][ T9862] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 251.895786][ T9862] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 251.903745][ T9862] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6995a2b6d4 [ 251.911803][ T9862] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 251.920758][ T9862] memory: usage 16936kB, limit 0kB, failcnt 55 [ 251.931607][ T9862] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 251.940209][ T9862] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 251.947970][ T9862] Memory cgroup stats for /syz0: cache:0KB rss:2260KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2188KB inactive_file:0KB active_file:0KB unevictable:0KB [ 251.985058][ T9862] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=9861,uid=0 [ 252.013561][ T9862] Memory cgroup out of memory: Killed process 9861 (syz-executor.0) total-vm:72708kB, anon-rss:2196kB, file-rss:35768kB, shmem-rss:0kB [ 252.031040][ T1042] oom_reaper: reaped process 9861 (syz-executor.0), now anon-rss:0kB, file-rss:34808kB, shmem-rss:0kB [ 252.031362][ T9865] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 252.145881][ T9865] CPU: 0 PID: 9865 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #1 [ 252.153728][ T9865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.164248][ T9865] Call Trace: [ 252.167727][ T9865] dump_stack+0x172/0x1f0 [ 252.172422][ T9865] dump_header+0x10f/0xb6c [ 252.176849][ T9865] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 252.182666][ T9865] ? ___ratelimit+0x60/0x595 [ 252.187274][ T9865] ? do_raw_spin_unlock+0x57/0x270 [ 252.192407][ T9865] oom_kill_process.cold+0x10/0x15 [ 252.197530][ T9865] out_of_memory+0x79a/0x1280 [ 252.202311][ T9865] ? oom_killer_disable+0x280/0x280 [ 252.207961][ T9865] mem_cgroup_out_of_memory+0x1ca/0x230 [ 252.213613][ T9865] ? memcg_event_wake+0x230/0x230 [ 252.223504][ T9865] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 252.230777][ T9865] ? cgroup_file_notify+0x140/0x1b0 [ 252.237590][ T9865] memory_max_write+0x169/0x300 04:11:53 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r5 = gettid() write$cgroup_pid(r4, &(0x7f0000000500)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x89f) write$cgroup_int(r7, 0x0, 0x0) [ 252.242465][ T9865] ? mem_cgroup_write+0x360/0x360 [ 252.247597][ T9865] ? lock_acquire+0x16f/0x3f0 [ 252.252291][ T9865] ? kernfs_fop_write+0x227/0x480 [ 252.257434][ T9865] cgroup_file_write+0x241/0x790 [ 252.262404][ T9865] ? mem_cgroup_write+0x360/0x360 [ 252.267891][ T9865] ? kill_css+0x380/0x380 [ 252.272243][ T9865] ? kill_css+0x380/0x380 [ 252.272259][ T9865] kernfs_fop_write+0x2b8/0x480 [ 252.272277][ T9865] __vfs_write+0x8a/0x110 [ 252.272288][ T9865] ? kernfs_fop_open+0xd80/0xd80 [ 252.272303][ T9865] vfs_write+0x20c/0x580 [ 252.272319][ T9865] ksys_write+0x14f/0x290 [ 252.272333][ T9865] ? __ia32_sys_read+0xb0/0xb0 [ 252.272350][ T9865] ? do_syscall_64+0x26/0x680 [ 252.272364][ T9865] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.272376][ T9865] ? do_syscall_64+0x26/0x680 [ 252.272401][ T9865] __x64_sys_write+0x73/0xb0 [ 252.326192][ T9865] do_syscall_64+0xfd/0x680 [ 252.330793][ T9865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.337129][ T9865] RIP: 0033:0x459279 [ 252.341020][ T9865] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 252.361676][ T9865] RSP: 002b:00007f7eeac72c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 252.371176][ T9865] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 252.379503][ T9865] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 252.388362][ T9865] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 252.396556][ T9865] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7eeac736d4 [ 252.404930][ T9865] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 252.429358][ T9865] memory: usage 6116kB, limit 0kB, failcnt 0 [ 252.453839][ T9865] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 252.469904][ T9865] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 252.479773][ T9865] Memory cgroup stats for /syz4: cache:56KB rss:2268KB rss_huge:2048KB shmem:52KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2200KB inactive_file:132KB active_file:0KB unevictable:0KB [ 252.508289][ T9865] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9864,uid=0 [ 252.530544][ T9865] Memory cgroup out of memory: Killed process 9865 (syz-executor.4) total-vm:72576kB, anon-rss:2192kB, file-rss:35792kB, shmem-rss:0kB [ 252.552040][ T8824] syz-executor.0 invoked oom-killer: gfp_mask=0x40cd0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 252.553160][ T1042] oom_reaper: reaped process 9865 (syz-executor.4), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 252.568360][ T8824] CPU: 1 PID: 8824 Comm: syz-executor.0 Not tainted 5.2.0-rc1+ #1 [ 252.583691][ T8824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.593847][ T8824] Call Trace: [ 252.597153][ T8824] dump_stack+0x172/0x1f0 [ 252.601495][ T8824] dump_header+0x10f/0xb6c [ 252.605914][ T8824] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 252.611790][ T8824] ? ___ratelimit+0x60/0x595 [ 252.616476][ T8824] ? do_raw_spin_unlock+0x57/0x270 [ 252.621906][ T8824] oom_kill_process.cold+0x10/0x15 [ 252.627195][ T8824] out_of_memory+0x79a/0x1280 [ 252.631881][ T8824] ? oom_killer_disable+0x280/0x280 [ 252.637077][ T8824] ? find_held_lock+0x35/0x130 [ 252.641964][ T8824] mem_cgroup_out_of_memory+0x1ca/0x230 [ 252.647509][ T8824] ? memcg_event_wake+0x230/0x230 [ 252.653071][ T8824] ? do_raw_spin_unlock+0x57/0x270 [ 252.658186][ T8824] ? _raw_spin_unlock+0x2d/0x50 [ 252.665129][ T8824] try_charge+0x102c/0x15c0 [ 252.670861][ T8824] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 252.678418][ T8824] ? should_fail+0x1de/0x852 [ 252.683020][ T8824] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 252.688574][ T8824] ? rcu_read_lock_sched_held+0x110/0x130 [ 252.694315][ T8824] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 252.699869][ T8824] __memcg_kmem_charge_memcg+0x7c/0x130 [ 252.705441][ T8824] ? memcg_kmem_put_cache+0xb0/0xb0 [ 252.710721][ T8824] ? cache_grow_begin+0x3d6/0x650 [ 252.715755][ T8824] ? lockdep_hardirqs_on+0x418/0x5d0 [ 252.721053][ T8824] ? trace_hardirqs_on+0x67/0x220 [ 252.726083][ T8824] cache_grow_begin+0x402/0x650 [ 252.731028][ T8824] ? __cpuset_node_allowed+0x136/0x540 [ 252.736663][ T8824] fallback_alloc+0x1fd/0x2d0 [ 252.741360][ T8824] ____cache_alloc_node+0x1be/0x1e0 [ 252.746584][ T8824] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 252.752918][ T8824] kmem_cache_alloc+0x1e8/0x6f0 [ 252.757774][ T8824] ? ___might_sleep+0x163/0x280 [ 252.762645][ T8824] ? sock_destroy_inode+0x60/0x60 [ 252.767670][ T8824] sock_alloc_inode+0x1d/0x260 [ 252.772702][ T8824] alloc_inode+0x68/0x1e0 [ 252.777999][ T8824] new_inode_pseudo+0x19/0xf0 [ 252.782813][ T8824] sock_alloc+0x41/0x270 [ 252.787070][ T8824] __sock_create+0xc2/0x730 [ 252.791593][ T8824] ? _raw_spin_unlock_irq+0x28/0x90 [ 252.796805][ T8824] __sys_socket+0x103/0x220 [ 252.801314][ T8824] ? move_addr_to_kernel+0x80/0x80 [ 252.806456][ T8824] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 252.812095][ T8824] ? do_syscall_64+0x26/0x680 [ 252.817678][ T8824] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.824126][ T8824] ? do_syscall_64+0x26/0x680 [ 252.829073][ T8824] __x64_sys_socket+0x73/0xb0 [ 252.833838][ T8824] do_syscall_64+0xfd/0x680 [ 252.838606][ T8824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.844666][ T8824] RIP: 0033:0x45bdc7 [ 252.848758][ T8824] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 252.868715][ T8824] RSP: 002b:00007ffc0e52af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 252.877327][ T8824] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045bdc7 [ 252.885563][ T8824] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 252.893531][ T8824] RBP: 0000000000000086 R08: 00007ffc0e52afcc R09: 000000000000000a [ 252.901589][ T8824] R10: 00007ffc0e52afd0 R11: 0000000000000246 R12: 0000000000000000 04:11:53 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r5 = gettid() write$cgroup_pid(r4, &(0x7f0000000500)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x89f) write$cgroup_int(r7, 0x0, 0x0) [ 252.909646][ T8824] R13: 00007ffc0e52b6d0 R14: 000000000003d54e R15: 00007ffc0e52b6e0 [ 252.927080][ T8824] memory: usage 14536kB, limit 0kB, failcnt 71 [ 252.934661][ T8824] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 252.957433][ T8824] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 252.972558][ T8824] Memory cgroup stats for /syz0: cache:0KB rss:68KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:68KB inactive_file:0KB active_file:0KB unevictable:0KB [ 252.995122][ T8824] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8824,uid=0 [ 253.017098][ T8824] Memory cgroup out of memory: Killed process 8824 (syz-executor.0) total-vm:72444kB, anon-rss:96kB, file-rss:35776kB, shmem-rss:0kB [ 253.037648][ T8650] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 253.038160][ T1042] oom_reaper: reaped process 8824 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 253.057988][ T8650] CPU: 1 PID: 8650 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #1 [ 253.068975][ T8650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.079290][ T8650] Call Trace: [ 253.082601][ T8650] dump_stack+0x172/0x1f0 [ 253.086963][ T8650] dump_header+0x10f/0xb6c [ 253.091383][ T8650] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 253.097278][ T8650] ? ___ratelimit+0x60/0x595 [ 253.101868][ T8650] ? do_raw_spin_unlock+0x57/0x270 [ 253.107009][ T8650] oom_kill_process.cold+0x10/0x15 [ 253.112126][ T8650] out_of_memory+0x79a/0x1280 [ 253.116811][ T8650] ? oom_killer_disable+0x280/0x280 [ 253.122194][ T8650] ? find_held_lock+0x35/0x130 [ 253.126978][ T8650] mem_cgroup_out_of_memory+0x1ca/0x230 [ 253.132567][ T8650] ? memcg_event_wake+0x230/0x230 [ 253.137860][ T8650] ? do_raw_spin_unlock+0x57/0x270 [ 253.143335][ T8650] ? _raw_spin_unlock+0x2d/0x50 [ 253.148559][ T8650] try_charge+0x102c/0x15c0 [ 253.153339][ T8650] ? find_held_lock+0x35/0x130 [ 253.158113][ T8650] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 253.164622][ T8650] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 253.170217][ T8650] ? find_held_lock+0x35/0x130 [ 253.175262][ T8650] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 253.181265][ T8650] __memcg_kmem_charge_memcg+0x7c/0x130 [ 253.186817][ T8650] ? memcg_kmem_put_cache+0xb0/0xb0 [ 253.192145][ T8650] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 253.198795][ T8650] __memcg_kmem_charge+0x136/0x300 [ 253.204650][ T8650] __alloc_pages_nodemask+0x4bd/0x8d0 [ 253.212643][ T8650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.219068][ T8650] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 253.225054][ T8650] ? copy_process.part.0+0x43f7/0x6790 [ 253.230718][ T8650] ? lockdep_hardirqs_on+0x418/0x5d0 [ 253.236019][ T8650] ? trace_hardirqs_on+0x67/0x220 [ 253.241042][ T8650] ? kasan_check_read+0x11/0x20 [ 253.245900][ T8650] copy_process.part.0+0x4a0/0x6790 [ 253.251103][ T8650] ? __might_fault+0x12b/0x1e0 [ 253.255974][ T8650] ? __cleanup_sighand+0x60/0x60 [ 253.261058][ T8650] ? lock_downgrade+0x880/0x880 [ 253.265921][ T8650] _do_fork+0x25d/0xfe0 [ 253.270087][ T8650] ? copy_init_mm+0x20/0x20 [ 253.274781][ T8650] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 253.280241][ T8650] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 253.285798][ T8650] ? do_syscall_64+0x26/0x680 [ 253.290474][ T8650] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.296623][ T8650] ? do_syscall_64+0x26/0x680 [ 253.301399][ T8650] __x64_sys_clone+0xbf/0x150 [ 253.306380][ T8650] do_syscall_64+0xfd/0x680 [ 253.310885][ T8650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.316774][ T8650] RIP: 0033:0x45784a [ 253.320758][ T8650] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 253.340449][ T8650] RSP: 002b:00007ffd597e5710 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 253.349245][ T8650] RAX: ffffffffffffffda RBX: 00007ffd597e5710 RCX: 000000000045784a [ 253.357342][ T8650] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 253.366357][ T8650] RBP: 00007ffd597e5750 R08: 0000000000000001 R09: 0000555556894940 [ 253.374965][ T8650] R10: 0000555556894c10 R11: 0000000000000246 R12: 0000000000000001 [ 253.383400][ T8650] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd597e57a0 [ 253.408722][ T8650] memory: usage 3768kB, limit 0kB, failcnt 8 [ 253.415181][ T8650] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 253.423183][ T8650] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 253.431017][ T8650] Memory cgroup stats for /syz4: cache:56KB rss:156KB rss_huge:0KB shmem:52KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:132KB active_file:0KB unevictable:0KB [ 253.453253][ T8650] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8650,uid=0 04:11:54 executing program 3: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='notify_on_release\x00') r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000480)='cpuset.memory_pressure\x00', 0x0, 0x0) r5 = gettid() openat$cgroup_ro(r4, &(0x7f0000000580)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r4, &(0x7f00000004c0)=r5, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={r3, 0x7, 0x1, 0x400, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000000c0)='notify_on_release\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.swap.current\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={r7}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) r9 = socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x20) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000540)={r9}) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x3, 0x3, 0x1000, 0x0, 0xffffffffffffffff, 0x9000, 0x0, 0x10001, 0x3, 0x5, 0x93ec, 0x400, 0x8, 0xf0, 0x3a, 0x0, 0x9, 0x100000001, 0x6, 0x400000, 0x0, 0x10000, 0xc31b, 0xffffffff, 0x8001, 0x0, 0x2, 0x37, 0xcf8, 0x0, 0x7, 0xfff, 0x4, 0x1677, 0xfffffffffffffffc, 0x0, 0x3, 0x4, @perf_config_ext={0x800, 0xff}, 0x4004, 0xd3, 0x8000, 0x0, 0x0, 0x10000}, r10, 0xa, r2, 0x2) openat$cgroup_ro(r7, &(0x7f0000000500)='pids.events\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r8, 0x800454d3, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="00706964732061202d6d656d6f72792000aa6f20"], 0x14) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x0, 0x0, "b6bc8fda04ae1bf1a1e4431ff3e4e210a9ad83a2709b87b524875076871471eb7b6e745475d5febe321ff3eb7a90f27b92d384bf15cacfa784201efd3d604b"}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f0000000000)) [ 253.469794][ T8650] Memory cgroup out of memory: Killed process 8650 (syz-executor.4) total-vm:72444kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB [ 253.507417][ T1042] oom_reaper: reaped process 8650 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 04:11:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x11, 0x2, 0x300) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x2002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) [ 254.160184][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 254.166083][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:11:55 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r5 = gettid() write$cgroup_pid(r4, &(0x7f0000000500)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x89f) write$cgroup_int(r7, 0x0, 0x0) 04:11:55 executing program 3: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='notify_on_release\x00') r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000480)='cpuset.memory_pressure\x00', 0x0, 0x0) r5 = gettid() openat$cgroup_ro(r4, &(0x7f0000000580)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r4, &(0x7f00000004c0)=r5, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={r3, 0x7, 0x1, 0x400, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000000c0)='notify_on_release\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.swap.current\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={r7}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) r9 = socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x20) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000540)={r9}) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x3, 0x3, 0x1000, 0x0, 0xffffffffffffffff, 0x9000, 0x0, 0x10001, 0x3, 0x5, 0x93ec, 0x400, 0x8, 0xf0, 0x3a, 0x0, 0x9, 0x100000001, 0x6, 0x400000, 0x0, 0x10000, 0xc31b, 0xffffffff, 0x8001, 0x0, 0x2, 0x37, 0xcf8, 0x0, 0x7, 0xfff, 0x4, 0x1677, 0xfffffffffffffffc, 0x0, 0x3, 0x4, @perf_config_ext={0x800, 0xff}, 0x4004, 0xd3, 0x8000, 0x0, 0x0, 0x10000}, r10, 0xa, r2, 0x2) openat$cgroup_ro(r7, &(0x7f0000000500)='pids.events\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r8, 0x800454d3, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="00706964732061202d6d656d6f72792000aa6f20"], 0x14) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x0, 0x0, "b6bc8fda04ae1bf1a1e4431ff3e4e210a9ad83a2709b87b524875076871471eb7b6e745475d5febe321ff3eb7a90f27b92d384bf15cacfa784201efd3d604b"}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f0000000000)) 04:11:55 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r5 = gettid() write$cgroup_pid(r4, &(0x7f0000000500)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x89f) write$cgroup_int(r7, 0x0, 0x0) [ 254.550563][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 254.556465][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:11:55 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r5 = gettid() write$cgroup_pid(r4, &(0x7f0000000500)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x89f) write$cgroup_int(r7, 0x0, 0x0) 04:11:55 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r5 = gettid() write$cgroup_pid(r4, &(0x7f0000000500)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x89f) write$cgroup_int(r7, 0x0, 0x0) [ 254.630230][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 254.636225][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:11:55 executing program 5: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='notify_on_release\x00') r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000480)='cpuset.memory_pressure\x00', 0x0, 0x0) r5 = gettid() openat$cgroup_ro(r4, &(0x7f0000000580)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r4, &(0x7f00000004c0)=r5, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={r3, 0x7, 0x1, 0x400, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000000c0)='notify_on_release\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.swap.current\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={r7}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) r9 = socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x20) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000540)={r9}) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x3, 0x3, 0x1000, 0x0, 0xffffffffffffffff, 0x9000, 0x0, 0x10001, 0x3, 0x5, 0x93ec, 0x400, 0x8, 0xf0, 0x3a, 0x0, 0x9, 0x100000001, 0x6, 0x400000, 0x0, 0x10000, 0xc31b, 0xffffffff, 0x8001, 0x0, 0x2, 0x37, 0xcf8, 0x0, 0x7, 0xfff, 0x4, 0x1677, 0xfffffffffffffffc, 0x0, 0x3, 0x4, @perf_config_ext={0x800, 0xff}, 0x4004, 0xd3, 0x8000, 0x0, 0x0, 0x10000}, r10, 0xa, r2, 0x2) openat$cgroup_ro(r7, &(0x7f0000000500)='pids.events\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r8, 0x800454d3, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="00706964732061202d6d656d6f72792000aa6f20"], 0x14) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x0, 0x0, "b6bc8fda04ae1bf1a1e4431ff3e4e210a9ad83a2709b87b524875076871471eb7b6e745475d5febe321ff3eb7a90f27b92d384bf15cacfa784201efd3d604b"}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f0000000000)) 04:11:55 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffff3) sendmsg(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x280000, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r4, &(0x7f0000000040)={[{0x2f, 'pids'}, {0x2f, 'rdma'}, {0x0, 'cpu'}, {0x0, 'cpu'}]}, 0x16) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r5, &(0x7f0000000000)={[{0x2dcd3, 'memory', 0xe}]}, 0x200600) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1b) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001440)={&(0x7f0000000400)='./file0\x00'}, 0x10) openat$cgroup_ro(r3, &(0x7f0000000340)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000040)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000003c0)={'hwsim0\x00', 0x20}) 04:11:55 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xffffffff) 04:11:55 executing program 0: perf_event_open(&(0x7f0000000ac0)={0x2, 0x70, 0x1e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r0, 0x1, 0x7, &(0x7f00000016c0), 0x4) 04:11:57 executing program 5: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='notify_on_release\x00') r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000480)='cpuset.memory_pressure\x00', 0x0, 0x0) r5 = gettid() openat$cgroup_ro(r4, &(0x7f0000000580)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r4, &(0x7f00000004c0)=r5, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={r3, 0x7, 0x1, 0x400, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000000c0)='notify_on_release\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.swap.current\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={r7}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) r9 = socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x20) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000540)={r9}) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x3, 0x3, 0x1000, 0x0, 0xffffffffffffffff, 0x9000, 0x0, 0x10001, 0x3, 0x5, 0x93ec, 0x400, 0x8, 0xf0, 0x3a, 0x0, 0x9, 0x100000001, 0x6, 0x400000, 0x0, 0x10000, 0xc31b, 0xffffffff, 0x8001, 0x0, 0x2, 0x37, 0xcf8, 0x0, 0x7, 0xfff, 0x4, 0x1677, 0xfffffffffffffffc, 0x0, 0x3, 0x4, @perf_config_ext={0x800, 0xff}, 0x4004, 0xd3, 0x8000, 0x0, 0x0, 0x10000}, r10, 0xa, r2, 0x2) openat$cgroup_ro(r7, &(0x7f0000000500)='pids.events\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r8, 0x800454d3, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="00706964732061202d6d656d6f72792000aa6f20"], 0x14) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x0, 0x0, "b6bc8fda04ae1bf1a1e4431ff3e4e210a9ad83a2709b87b524875076871471eb7b6e745475d5febe321ff3eb7a90f27b92d384bf15cacfa784201efd3d604b"}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f0000000000)) 04:11:57 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffff3) sendmsg(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x280000, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r4, &(0x7f0000000040)={[{0x2f, 'pids'}, {0x2f, 'rdma'}, {0x0, 'cpu'}, {0x0, 'cpu'}]}, 0x16) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r5, &(0x7f0000000000)={[{0x2dcd3, 'memory', 0xe}]}, 0x200600) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1b) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001440)={&(0x7f0000000400)='./file0\x00'}, 0x10) openat$cgroup_ro(r3, &(0x7f0000000340)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000040)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000003c0)={'hwsim0\x00', 0x20}) [ 256.136727][ T9898] IPVS: ftp: loaded support on port[0] = 21 04:11:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x11, 0x2, 0x300) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x2002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 04:11:57 executing program 5: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='notify_on_release\x00') r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000480)='cpuset.memory_pressure\x00', 0x0, 0x0) r5 = gettid() openat$cgroup_ro(r4, &(0x7f0000000580)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r4, &(0x7f00000004c0)=r5, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={r3, 0x7, 0x1, 0x400, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000000c0)='notify_on_release\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.swap.current\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) r8 = openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={r7}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) r9 = socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x20) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000540)={r9}) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x3, 0x3, 0x1000, 0x0, 0xffffffffffffffff, 0x9000, 0x0, 0x10001, 0x3, 0x5, 0x93ec, 0x400, 0x8, 0xf0, 0x3a, 0x0, 0x9, 0x100000001, 0x6, 0x400000, 0x0, 0x10000, 0xc31b, 0xffffffff, 0x8001, 0x0, 0x2, 0x37, 0xcf8, 0x0, 0x7, 0xfff, 0x4, 0x1677, 0xfffffffffffffffc, 0x0, 0x3, 0x4, @perf_config_ext={0x800, 0xff}, 0x4004, 0xd3, 0x8000, 0x0, 0x0, 0x10000}, r10, 0xa, r2, 0x2) openat$cgroup_ro(r7, &(0x7f0000000500)='pids.events\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r8, 0x800454d3, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="00706964732061202d6d656d6f72792000aa6f20"], 0x14) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x0, 0x0, "b6bc8fda04ae1bf1a1e4431ff3e4e210a9ad83a2709b87b524875076871471eb7b6e745475d5febe321ff3eb7a90f27b92d384bf15cacfa784201efd3d604b"}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f0000000000)) [ 256.513287][ T9912] IPVS: ftp: loaded support on port[0] = 21 04:11:57 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffff3) sendmsg(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x280000, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r4, &(0x7f0000000040)={[{0x2f, 'pids'}, {0x2f, 'rdma'}, {0x0, 'cpu'}, {0x0, 'cpu'}]}, 0x16) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r5, &(0x7f0000000000)={[{0x2dcd3, 'memory', 0xe}]}, 0x200600) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1b) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001440)={&(0x7f0000000400)='./file0\x00'}, 0x10) openat$cgroup_ro(r3, &(0x7f0000000340)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000040)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000003c0)={'hwsim0\x00', 0x20}) [ 256.630175][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 256.636107][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 256.710192][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 256.716294][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 256.855073][ T9916] IPVS: ftp: loaded support on port[0] = 21 [ 258.156732][ T9898] chnl_net:caif_netlink_parms(): no params data found [ 258.209238][ T2645] device bridge_slave_1 left promiscuous mode [ 258.229236][ T2645] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.281409][ T2645] device bridge_slave_0 left promiscuous mode [ 258.288251][ T2645] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.903478][ T2645] device hsr_slave_1 left promiscuous mode [ 259.945084][ T2645] device hsr_slave_0 left promiscuous mode [ 260.004886][ T2645] team0 (unregistering): Port device team_slave_1 removed [ 260.016817][ T2645] team0 (unregistering): Port device team_slave_0 removed [ 260.028225][ T2645] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 260.067185][ T2645] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 260.155697][ T2645] bond0 (unregistering): Released all slaves [ 260.266237][ T9916] chnl_net:caif_netlink_parms(): no params data found [ 260.278298][ T9898] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.286362][ T9898] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.294623][ T9898] device bridge_slave_0 entered promiscuous mode [ 260.305404][ T9898] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.312897][ T9898] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.320958][ T9898] device bridge_slave_1 entered promiscuous mode [ 260.377408][ T9898] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 260.404250][ T9898] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 260.429822][ T9916] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.437297][ T9916] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.445269][ T9916] device bridge_slave_0 entered promiscuous mode [ 260.454995][ T9916] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.462155][ T9916] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.469776][ T9916] device bridge_slave_1 entered promiscuous mode [ 260.478287][ T9898] team0: Port device team_slave_0 added [ 260.485505][ T9912] chnl_net:caif_netlink_parms(): no params data found [ 260.504949][ T9898] team0: Port device team_slave_1 added [ 260.594761][ T9916] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 260.663082][ T9898] device hsr_slave_0 entered promiscuous mode [ 260.700535][ T9898] device hsr_slave_1 entered promiscuous mode [ 260.782875][ T9916] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 260.814272][ T9912] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.822226][ T9912] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.831330][ T9912] device bridge_slave_0 entered promiscuous mode [ 260.862692][ T9912] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.869774][ T9912] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.878777][ T9912] device bridge_slave_1 entered promiscuous mode [ 260.892516][ T9916] team0: Port device team_slave_0 added [ 260.912333][ T9916] team0: Port device team_slave_1 added [ 260.935982][ T9898] 8021q: adding VLAN 0 to HW filter on device bond0 [ 260.954693][ T9912] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 260.966069][ T9912] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 261.023211][ T9916] device hsr_slave_0 entered promiscuous mode [ 261.070786][ T9916] device hsr_slave_1 entered promiscuous mode [ 261.134808][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 261.149849][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 261.159018][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 261.169784][ T9898] 8021q: adding VLAN 0 to HW filter on device team0 [ 261.180849][ T9912] team0: Port device team_slave_0 added [ 261.198332][ T9912] team0: Port device team_slave_1 added [ 261.207471][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 261.217300][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 261.227663][ T8657] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.235050][ T8657] bridge0: port 1(bridge_slave_0) entered forwarding state [ 261.252001][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 261.267713][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 261.276698][ T8657] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.283816][ T8657] bridge0: port 2(bridge_slave_1) entered forwarding state [ 261.312639][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 261.326352][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 261.366249][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 261.378101][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 261.396650][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 261.409546][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 261.424623][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 261.473297][ T9912] device hsr_slave_0 entered promiscuous mode [ 261.510657][ T9912] device hsr_slave_1 entered promiscuous mode [ 261.559786][ T9898] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 261.572902][ T9898] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 261.586283][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 261.595688][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 261.649928][ T9898] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 261.676696][ T9916] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.714967][ T9916] 8021q: adding VLAN 0 to HW filter on device team0 [ 261.722902][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 261.732144][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 261.810812][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 261.821949][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 261.851215][ T3692] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.858542][ T3692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 261.866887][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 261.883998][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 261.921867][ T3692] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.929867][ T3692] bridge0: port 2(bridge_slave_1) entered forwarding state [ 261.938221][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 261.947925][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 261.980831][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 261.989612][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 262.001183][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 262.023931][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 262.033840][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 262.042972][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 262.052074][ T9938] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 262.052600][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 262.070407][ T9938] CPU: 0 PID: 9938 Comm: syz-executor.2 Not tainted 5.2.0-rc1+ #1 [ 262.078700][ T9938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.085399][ T9916] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 262.089146][ T9938] Call Trace: [ 262.103163][ T9938] dump_stack+0x172/0x1f0 [ 262.108842][ T9938] dump_header+0x10f/0xb6c [ 262.108882][ T9916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 262.113407][ T9938] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 262.113422][ T9938] ? ___ratelimit+0x60/0x595 [ 262.113436][ T9938] ? do_raw_spin_unlock+0x57/0x270 [ 262.113454][ T9938] oom_kill_process.cold+0x10/0x15 [ 262.113469][ T9938] out_of_memory+0x79a/0x1280 [ 262.113486][ T9938] ? __sched_text_start+0x8/0x8 [ 262.113527][ T9938] ? oom_killer_disable+0x280/0x280 [ 262.147996][ T9916] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 262.148362][ T9938] mem_cgroup_out_of_memory+0x1ca/0x230 [ 262.159371][ T9938] ? memcg_event_wake+0x230/0x230 [ 262.177267][ T9938] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 262.183114][ T9938] ? cgroup_file_notify+0x140/0x1b0 [ 262.188705][ T9938] memory_max_write+0x169/0x300 [ 262.194211][ T9938] ? mem_cgroup_write+0x360/0x360 [ 262.200048][ T9938] ? cgroup_file_write+0x188/0x790 [ 262.205195][ T9938] cgroup_file_write+0x241/0x790 [ 262.210337][ T9938] ? mem_cgroup_write+0x360/0x360 [ 262.218004][ T9938] ? kill_css+0x380/0x380 [ 262.228639][ T9938] ? kill_css+0x380/0x380 [ 262.235029][ T9938] kernfs_fop_write+0x2b8/0x480 [ 262.240001][ T9938] __vfs_write+0x8a/0x110 [ 262.245315][ T9938] ? kernfs_fop_open+0xd80/0xd80 [ 262.250717][ T9938] vfs_write+0x20c/0x580 [ 262.254988][ T9938] ksys_write+0x14f/0x290 [ 262.259426][ T9938] ? __ia32_sys_read+0xb0/0xb0 [ 262.264219][ T9938] ? do_syscall_64+0x26/0x680 [ 262.269020][ T9938] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.275527][ T9938] ? do_syscall_64+0x26/0x680 [ 262.280310][ T9938] __x64_sys_write+0x73/0xb0 [ 262.285085][ T9938] do_syscall_64+0xfd/0x680 [ 262.291355][ T9938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.298825][ T9938] RIP: 0033:0x459279 [ 262.303547][ T9938] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.324159][ T9938] RSP: 002b:00007f0c9a187c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 262.333728][ T9938] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 262.342126][ T9938] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 262.353056][ T9938] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 262.365543][ T9938] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0c9a1886d4 [ 262.376520][ T9938] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 262.420501][ T9912] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.451681][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 262.478659][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 262.508754][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 262.519132][ T9938] memory: usage 4608kB, limit 0kB, failcnt 66 [ 262.535447][ T9938] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 262.537191][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.549586][ T9938] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 262.563302][ T9938] Memory cgroup stats for /syz2: cache:0KB rss:2204KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2204KB inactive_file:0KB active_file:0KB unevictable:0KB [ 262.565040][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.590111][ T9938] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=9937,uid=0 [ 262.608535][ T9912] 8021q: adding VLAN 0 to HW filter on device team0 [ 262.616888][ T9938] Memory cgroup out of memory: Killed process 9937 (syz-executor.2) total-vm:72712kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 262.645140][ T1042] oom_reaper: reaped process 9937 (syz-executor.2), now anon-rss:0kB, file-rss:34808kB, shmem-rss:0kB [ 262.662658][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 262.682226][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.707611][ T3692] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.715412][ T3692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.747812][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 262.766968][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.778747][ T3692] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.789338][ T3692] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.815214][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 04:12:03 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000240)=0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') 04:12:03 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffff3) sendmsg(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x280000, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r4, &(0x7f0000000040)={[{0x2f, 'pids'}, {0x2f, 'rdma'}, {0x0, 'cpu'}, {0x0, 'cpu'}]}, 0x16) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r5, &(0x7f0000000000)={[{0x2dcd3, 'memory', 0xe}]}, 0x200600) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1b) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001440)={&(0x7f0000000400)='./file0\x00'}, 0x10) openat$cgroup_ro(r3, &(0x7f0000000340)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000040)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000003c0)={'hwsim0\x00', 0x20}) 04:12:03 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(r1, &(0x7f0000000400), 0x12) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x80000001, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x7, 0x9, 0x200, 0x3, 0x0, 0x4, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x5, 0x7, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000600)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\x8d\xe2B\xdf\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000000)='./file0\x00', 0x0, 0x14}, 0x10) socketpair(0x8, 0xf, 0xe6, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0xb) unlink(&(0x7f0000000040)='./file0\x00') ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r2}) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r5, 0x2, 0x1, 0xe0000000, &(0x7f0000000080)=[0x0], 0x1}, 0x20) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4df0e00000000000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f00000003c0)=0x1, 0x12) socketpair(0x2, 0x0, 0x80000000, &(0x7f00000002c0)) 04:12:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x11, 0x2, 0x300) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x2002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 04:12:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffffd4}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) [ 263.073757][ T9898] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 263.103502][ T9898] CPU: 1 PID: 9898 Comm: syz-executor.2 Not tainted 5.2.0-rc1+ #1 [ 263.112305][ T9898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.123334][ T9898] Call Trace: [ 263.126826][ T9898] dump_stack+0x172/0x1f0 [ 263.131181][ T9898] dump_header+0x10f/0xb6c [ 263.135885][ T9898] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 263.142456][ T9898] ? ___ratelimit+0x60/0x595 [ 263.147630][ T9898] ? do_raw_spin_unlock+0x57/0x270 [ 263.153336][ T9898] oom_kill_process.cold+0x10/0x15 [ 263.159059][ T9898] out_of_memory+0x79a/0x1280 [ 263.163889][ T9898] ? lock_downgrade+0x880/0x880 [ 263.169425][ T9898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.176124][ T9898] ? oom_killer_disable+0x280/0x280 [ 263.181352][ T9898] ? find_held_lock+0x35/0x130 [ 263.186514][ T9898] mem_cgroup_out_of_memory+0x1ca/0x230 [ 263.193446][ T9898] ? memcg_event_wake+0x230/0x230 [ 263.193466][ T9898] ? do_raw_spin_unlock+0x57/0x270 [ 263.193480][ T9898] ? _raw_spin_unlock+0x2d/0x50 [ 263.193496][ T9898] try_charge+0x102c/0x15c0 [ 263.193506][ T9898] ? find_held_lock+0x35/0x130 [ 263.193530][ T9898] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 263.227881][ T9898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.234774][ T9898] ? kasan_check_read+0x11/0x20 [ 263.240481][ T9898] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 263.246463][ T9898] mem_cgroup_try_charge+0x24d/0x5e0 [ 263.252176][ T9898] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 263.257915][ T9898] wp_page_copy+0x416/0x1770 [ 263.264164][ T9898] ? do_wp_page+0x486/0x1500 [ 263.269171][ T9898] ? pmd_pfn+0x1d0/0x1d0 [ 263.273631][ T9898] ? lock_downgrade+0x880/0x880 [ 263.279027][ T9898] ? swp_swapcount+0x540/0x540 [ 263.283829][ T9898] ? do_raw_spin_unlock+0x57/0x270 [ 263.289346][ T9898] ? kasan_check_read+0x11/0x20 [ 263.294692][ T9898] ? do_raw_spin_unlock+0x57/0x270 [ 263.300239][ T9898] do_wp_page+0x48e/0x1500 [ 263.305198][ T9898] ? finish_mkwrite_fault+0x540/0x540 [ 263.310699][ T9898] __handle_mm_fault+0x22e3/0x3eb0 [ 263.316456][ T9898] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 263.322733][ T9898] ? find_held_lock+0x35/0x130 [ 263.327650][ T9898] ? handle_mm_fault+0x292/0xa90 [ 263.332718][ T9898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.338984][ T9898] ? kasan_check_read+0x11/0x20 [ 263.343951][ T9898] handle_mm_fault+0x3b7/0xa90 [ 263.349478][ T9898] __do_page_fault+0x5ef/0xda0 [ 263.354464][ T9898] do_page_fault+0x71/0x57d [ 263.359175][ T9898] ? page_fault+0x8/0x30 [ 263.365230][ T9898] page_fault+0x1e/0x30 [ 263.369665][ T9898] RIP: 0033:0x430356 [ 263.373594][ T9898] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 263.395473][ T9898] RSP: 002b:00007fff9d1683f0 EFLAGS: 00010206 [ 263.403595][ T9898] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 263.413086][ T9898] RDX: 000055555678c930 RSI: 0000555556794970 RDI: 0000000000000003 [ 263.422250][ T9898] RBP: 0000000000008041 R08: 0000000000000001 R09: 000055555678b940 [ 263.430876][ T9898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 263.440107][ T9898] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 263.502195][ T9898] memory: usage 2228kB, limit 0kB, failcnt 74 [ 263.520195][ T9898] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 263.537524][ T9898] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 263.547469][ T9898] Memory cgroup stats for /syz2: cache:0KB rss:48KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:48KB inactive_file:0KB active_file:0KB unevictable:0KB [ 263.599416][ T9898] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=9898,uid=0 [ 263.623798][ T9898] Memory cgroup out of memory: Killed process 9898 (syz-executor.2) total-vm:72448kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 263.650280][ T1042] oom_reaper: reaped process 9898 (syz-executor.2), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 263.721665][ T3294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 263.760923][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 263.767329][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 264.571740][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 264.591487][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 264.613497][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 264.629305][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 264.661133][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 264.688441][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 264.710861][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 264.728436][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 265.448351][ T9912] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 265.471163][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 265.480734][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 265.667079][ T9912] 8021q: adding VLAN 0 to HW filter on device batadv0 04:12:06 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000005020000000000"], 0x0, 0x26}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x6, 0x4, 0x2, 0x5, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x0, 0x1}, 0x3c) 04:12:06 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000100)=@isdn={0x22, 0x0, 0x0, 0x8817}, 0x80, 0x0}, 0x0) 04:12:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x5}, {0x16}]}) 04:12:06 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(r1, &(0x7f0000000400), 0x12) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x80000001, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x7, 0x9, 0x200, 0x3, 0x0, 0x4, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x5, 0x7, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000600)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\x8d\xe2B\xdf\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000000)='./file0\x00', 0x0, 0x14}, 0x10) socketpair(0x8, 0xf, 0xe6, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0xb) unlink(&(0x7f0000000040)='./file0\x00') ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r2}) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r5, 0x2, 0x1, 0xe0000000, &(0x7f0000000080)=[0x0], 0x1}, 0x20) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4df0e00000000000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f00000003c0)=0x1, 0x12) socketpair(0x2, 0x0, 0x80000000, &(0x7f00000002c0)) 04:12:06 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(r1, &(0x7f0000000400), 0x12) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x80000001, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x7, 0x9, 0x200, 0x3, 0x0, 0x4, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x5, 0x7, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000600)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\x8d\xe2B\xdf\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000000)='./file0\x00', 0x0, 0x14}, 0x10) socketpair(0x8, 0xf, 0xe6, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0xb) unlink(&(0x7f0000000040)='./file0\x00') ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r2}) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r5, 0x2, 0x1, 0xe0000000, &(0x7f0000000080)=[0x0], 0x1}, 0x20) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4df0e00000000000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f00000003c0)=0x1, 0x12) socketpair(0x2, 0x0, 0x80000000, &(0x7f00000002c0)) 04:12:06 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(r1, &(0x7f0000000400), 0x12) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x80000001, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x7, 0x9, 0x200, 0x3, 0x0, 0x4, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x5, 0x7, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000600)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\x8d\xe2B\xdf\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000000)='./file0\x00', 0x0, 0x14}, 0x10) socketpair(0x8, 0xf, 0xe6, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0xb) unlink(&(0x7f0000000040)='./file0\x00') ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r2}) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r5, 0x2, 0x1, 0xe0000000, &(0x7f0000000080)=[0x0], 0x1}, 0x20) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4df0e00000000000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f00000003c0)=0x1, 0x12) socketpair(0x2, 0x0, 0x80000000, &(0x7f00000002c0)) 04:12:06 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0xc0189436, 0x7fdfffffeffb) 04:12:07 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 04:12:07 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000000)=@ethernet={0x1, @local}, 0x80, 0x0, 0x0, &(0x7f00000002c0)=[{0x18, 0x1, 0x1, "fcda75c9"}], 0x18}, 0x0) 04:12:07 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x2, 0xb3, 0x1, 0x400, 0x0, 0x8, 0x0, 0x1, 0x7, 0x80, 0x4, 0x7, 0x8000, 0xfffffffffffffff9, 0x3, 0x4, 0x7, 0x7, 0x9, 0x20, 0x0, 0x9, 0x100000000, 0x0, 0x0, 0x2, 0x6, 0x0, 0x6, 0x6, 0x1, 0x3, 0x1, 0xff, 0xdf, 0x6, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x10000}, 0x4000, 0x512544fd, 0x8, 0x6, 0x2, 0x101}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x2) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.sched_load_balance\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000000)=0x4, 0x12) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) close(r1) write$cgroup_int(r2, &(0x7f0000000040), 0x12) socket$kcm(0x29, 0x0, 0x0) 04:12:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251}, 0x48) 04:12:07 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cgroup.clone_children\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000004c0), 0x12) 04:12:07 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x2, 0xb3, 0x1, 0x400, 0x0, 0x8, 0x0, 0x1, 0x7, 0x80, 0x4, 0x7, 0x8000, 0xfffffffffffffff9, 0x3, 0x4, 0x7, 0x7, 0x9, 0x20, 0x0, 0x9, 0x100000000, 0x0, 0x0, 0x2, 0x6, 0x0, 0x6, 0x6, 0x1, 0x3, 0x1, 0xff, 0xdf, 0x6, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x10000}, 0x4000, 0x512544fd, 0x8, 0x6, 0x2, 0x101}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x2) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.sched_load_balance\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000000)=0x4, 0x12) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) close(r1) write$cgroup_int(r2, &(0x7f0000000040), 0x12) socket$kcm(0x29, 0x0, 0x0) 04:12:07 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(r1, &(0x7f0000000400), 0x12) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x80000001, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x7, 0x9, 0x200, 0x3, 0x0, 0x4, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x5, 0x7, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000600)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\x8d\xe2B\xdf\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000000)='./file0\x00', 0x0, 0x14}, 0x10) socketpair(0x8, 0xf, 0xe6, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0xb) unlink(&(0x7f0000000040)='./file0\x00') ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r2}) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r5, 0x2, 0x1, 0xe0000000, &(0x7f0000000080)=[0x0], 0x1}, 0x20) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4df0e00000000000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f00000003c0)=0x1, 0x12) socketpair(0x2, 0x0, 0x80000000, &(0x7f00000002c0)) 04:12:08 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x20008844) 04:12:08 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(r1, &(0x7f0000000400), 0x12) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x80000001, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x7, 0x9, 0x200, 0x3, 0x0, 0x4, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x5, 0x7, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000600)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\x8d\xe2B\xdf\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000000)='./file0\x00', 0x0, 0x14}, 0x10) socketpair(0x8, 0xf, 0xe6, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0xb) unlink(&(0x7f0000000040)='./file0\x00') ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r2}) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r5, 0x2, 0x1, 0xe0000000, &(0x7f0000000080)=[0x0], 0x1}, 0x20) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4df0e00000000000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f00000003c0)=0x1, 0x12) socketpair(0x2, 0x0, 0x80000000, &(0x7f00000002c0)) [ 267.782688][T10036] IPVS: ftp: loaded support on port[0] = 21 [ 268.218839][ T2645] device bridge_slave_1 left promiscuous mode [ 268.242030][ T2645] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.311593][ T2645] device bridge_slave_0 left promiscuous mode [ 268.325248][ T2645] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.391817][ T2645] device bridge_slave_1 left promiscuous mode [ 268.411050][ T2645] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.471710][ T2645] device bridge_slave_0 left promiscuous mode [ 268.478993][ T2645] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.843942][ T2645] device hsr_slave_1 left promiscuous mode [ 271.926734][ T2645] device hsr_slave_0 left promiscuous mode [ 271.988539][ T2645] team0 (unregistering): Port device team_slave_1 removed [ 272.008944][ T2645] team0 (unregistering): Port device team_slave_0 removed [ 272.030538][ T2645] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 272.090339][ T2645] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 272.212765][ T2645] bond0 (unregistering): Released all slaves [ 272.393700][ T2645] device hsr_slave_1 left promiscuous mode [ 272.446249][ T2645] device hsr_slave_0 left promiscuous mode [ 272.496261][ T2645] team0 (unregistering): Port device team_slave_1 removed [ 272.509921][ T2645] team0 (unregistering): Port device team_slave_0 removed [ 272.525616][ T2645] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 272.555255][ T2645] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 272.649251][ T2645] bond0 (unregistering): Released all slaves [ 272.842742][T10036] chnl_net:caif_netlink_parms(): no params data found [ 272.888911][T10036] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.898987][T10036] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.908024][T10036] device bridge_slave_0 entered promiscuous mode [ 272.917316][T10036] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.925347][T10036] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.935233][T10036] device bridge_slave_1 entered promiscuous mode [ 272.956243][T10036] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 272.967257][T10036] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 272.992079][T10036] team0: Port device team_slave_0 added [ 272.999693][T10036] team0: Port device team_slave_1 added [ 273.073293][T10036] device hsr_slave_0 entered promiscuous mode [ 273.111586][T10036] device hsr_slave_1 entered promiscuous mode [ 273.162854][T10036] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.172482][T10036] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.182738][T10036] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.193405][T10036] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.348268][T10036] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.377150][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.389435][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.407069][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.430500][T10036] 8021q: adding VLAN 0 to HW filter on device team0 [ 273.445618][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 273.456167][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.463401][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.483693][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 273.493384][ T8657] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.501501][ T8657] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.529184][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 273.538925][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 273.567592][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 273.583872][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 273.598710][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 273.618537][T10036] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 273.665954][T10036] 8021q: adding VLAN 0 to HW filter on device batadv0 04:12:15 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(r1, &(0x7f0000000400), 0x12) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x80000001, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x7, 0x9, 0x200, 0x3, 0x0, 0x4, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x5, 0x7, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000600)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\x8d\xe2B\xdf\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000000)='./file0\x00', 0x0, 0x14}, 0x10) socketpair(0x8, 0xf, 0xe6, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0xb) unlink(&(0x7f0000000040)='./file0\x00') ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r2}) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r5, 0x2, 0x1, 0xe0000000, &(0x7f0000000080)=[0x0], 0x1}, 0x20) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4df0e00000000000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f00000003c0)=0x1, 0x12) socketpair(0x2, 0x0, 0x80000000, &(0x7f00000002c0)) 04:12:15 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x6, &(0x7f0000000080), 0x84) 04:12:15 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x2, 0xb3, 0x1, 0x400, 0x0, 0x8, 0x0, 0x1, 0x7, 0x80, 0x4, 0x7, 0x8000, 0xfffffffffffffff9, 0x3, 0x4, 0x7, 0x7, 0x9, 0x20, 0x0, 0x9, 0x100000000, 0x0, 0x0, 0x2, 0x6, 0x0, 0x6, 0x6, 0x1, 0x3, 0x1, 0xff, 0xdf, 0x6, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x10000}, 0x4000, 0x512544fd, 0x8, 0x6, 0x2, 0x101}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x2) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.sched_load_balance\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000000)=0x4, 0x12) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) close(r1) write$cgroup_int(r2, &(0x7f0000000040), 0x12) socket$kcm(0x29, 0x0, 0x0) 04:12:15 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(r1, &(0x7f0000000400), 0x12) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x80000001, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x7, 0x9, 0x200, 0x3, 0x0, 0x4, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x5, 0x7, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000600)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\x8d\xe2B\xdf\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000000)='./file0\x00', 0x0, 0x14}, 0x10) socketpair(0x8, 0xf, 0xe6, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0xb) unlink(&(0x7f0000000040)='./file0\x00') ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r2}) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r5, 0x2, 0x1, 0xe0000000, &(0x7f0000000080)=[0x0], 0x1}, 0x20) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4df0e00000000000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f00000003c0)=0x1, 0x12) socketpair(0x2, 0x0, 0x80000000, &(0x7f00000002c0)) 04:12:15 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x31, 0x0, 0x0) 04:12:15 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(r1, &(0x7f0000000400), 0x12) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x80000001, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x7, 0x9, 0x200, 0x3, 0x0, 0x4, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x5, 0x7, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000600)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\x8d\xe2B\xdf\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000000)='./file0\x00', 0x0, 0x14}, 0x10) socketpair(0x8, 0xf, 0xe6, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0xb) unlink(&(0x7f0000000040)='./file0\x00') ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r2}) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r5, 0x2, 0x1, 0xe0000000, &(0x7f0000000080)=[0x0], 0x1}, 0x20) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4df0e00000000000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f00000003c0)=0x1, 0x12) socketpair(0x2, 0x0, 0x80000000, &(0x7f00000002c0)) 04:12:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="39000000140081ae0000dc676f97daf01e23578134662c300b2c000500018701546fabca1b4e7d06a6580e88370200c54c1960b89c40ebb373", 0x39}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000007fc0)={0x0, 0x0, 0x0}, 0x0) 04:12:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1f9, 0x4, 0x100000001, 0x0, r0}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000140)}, 0x10) socket$kcm(0x11, 0x0, 0x300) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:12:15 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x2, 0xb3, 0x1, 0x400, 0x0, 0x8, 0x0, 0x1, 0x7, 0x80, 0x4, 0x7, 0x8000, 0xfffffffffffffff9, 0x3, 0x4, 0x7, 0x7, 0x9, 0x20, 0x0, 0x9, 0x100000000, 0x0, 0x0, 0x2, 0x6, 0x0, 0x6, 0x6, 0x1, 0x3, 0x1, 0xff, 0xdf, 0x6, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x10000}, 0x4000, 0x512544fd, 0x8, 0x6, 0x2, 0x101}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x2) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.sched_load_balance\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000000)=0x4, 0x12) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) close(r1) write$cgroup_int(r2, &(0x7f0000000040), 0x12) socket$kcm(0x29, 0x0, 0x0) [ 275.048350][T10079] BUG: spinlock bad magic on CPU#1, syz-executor.3/10079 [ 275.056594][T10079] kasan: CONFIG_KASAN_INLINE enabled [ 275.062355][T10079] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 275.073714][T10079] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 275.082490][T10079] CPU: 1 PID: 10079 Comm: syz-executor.3 Not tainted 5.2.0-rc1+ #1 [ 275.091933][T10079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.104722][T10079] RIP: 0010:spin_dump.cold+0xa2/0xe6 [ 275.110867][T10079] Code: 4e 4d 02 00 e8 c5 52 bd 05 58 5b 41 5c 41 5d 41 5e 5d c3 48 8d bb d0 04 00 00 b8 ff ff 37 00 48 89 fa 48 c1 e0 2a 48 c1 ea 03 <0f> b6 04 02 84 c0 74 04 3c 03 7e 24 44 8b ab d0 04 00 00 48 81 c3 [ 275.135053][T10079] RSP: 0018:ffff88808a8b7538 EFLAGS: 00010207 [ 275.142463][T10079] RAX: dffffc0000000000 RBX: 00000000067bdf8e RCX: 0000000000000000 [ 275.152997][T10079] RDX: 0000000000cf7c8b RSI: ffffffff815ac7e6 RDI: 00000000067be45e [ 275.161989][T10079] RBP: ffff88808a8b7560 R08: 0000000000000036 R09: ffffed1015d26011 [ 275.172771][T10079] R10: ffffed1015d26010 R11: ffff8880ae930087 R12: ffff8880877a3ba8 [ 275.184156][T10079] R13: ffff888063bde340 R14: ffff8880877a2980 R15: ffff88808a8b75d8 [ 275.193359][T10079] FS: 00007fefe8630700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 275.203792][T10079] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 275.211523][T10079] CR2: 0000000000738000 CR3: 00000000923f2000 CR4: 00000000001406e0 [ 275.220589][T10079] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 275.231909][T10079] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 275.242077][T10079] Call Trace: [ 275.246455][T10079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.253212][T10079] do_raw_spin_lock+0x231/0x2e0 [ 275.259937][T10079] ? rwlock_bug.part.0+0x90/0x90 [ 275.267045][T10079] ? lock_acquire+0x16f/0x3f0 [ 275.281505][T10079] ? rhashtable_walk_enter+0xf9/0x390 [ 275.286123][ T3879] kobject: 'loop0' (00000000bd25cf1d): kobject_uevent_env [ 275.288397][T10079] _raw_spin_lock+0x37/0x40 [ 275.310926][T10079] ? rhashtable_walk_enter+0xf9/0x390 [ 275.318126][ T3879] kobject: 'loop0' (00000000bd25cf1d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 275.321766][T10079] rhashtable_walk_enter+0xf9/0x390 [ 275.321784][T10079] __tipc_dump_start+0x1fa/0x3c0 [ 275.321797][T10079] tipc_dump_start+0x70/0x90 [ 275.321812][T10079] __netlink_dump_start+0x4f8/0x7d0 [ 275.321822][T10079] ? __tipc_dump_start+0x3c0/0x3c0 [ 275.321845][T10079] tipc_sock_diag_handler_dump+0x1d9/0x270 [ 275.367135][T10088] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 275.368017][T10079] ? __tipc_diag_gen_cookie+0x90/0x90 [ 275.368033][T10079] ? sock_diag_rcv+0x1c/0x40 [ 275.368045][T10079] ? __tipc_dump_start+0x3c0/0x3c0 [ 275.368060][T10079] ? tipc_unregister_sysctl+0x20/0x20 [ 275.368075][T10079] ? tipc_ioctl+0x2e0/0x2e0 [ 275.368097][T10079] sock_diag_rcv_msg+0x319/0x410 [ 275.377544][T10088] kobject: 'hwsim2' (00000000a570d7fb): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 275.381042][T10079] netlink_rcv_skb+0x177/0x450 [ 275.381059][T10079] ? sock_diag_bind+0x80/0x80 [ 275.381073][T10079] ? netlink_ack+0xb50/0xb50 [ 275.381087][T10079] ? kasan_check_read+0x11/0x20 [ 275.381101][T10079] ? netlink_deliver_tap+0x254/0xbf0 [ 275.381113][T10079] sock_diag_rcv+0x2b/0x40 [ 275.381126][T10079] netlink_unicast+0x531/0x710 [ 275.381142][T10079] ? netlink_attachskb+0x770/0x770 [ 275.381156][T10079] ? _copy_from_iter_full+0x25d/0x8c0 [ 275.381178][T10079] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 275.390442][T10088] kobject: 'hwsim2' (00000000a570d7fb): kobject_uevent_env [ 275.394281][T10079] ? __check_object_size+0x3d/0x42f [ 275.394317][T10079] netlink_sendmsg+0x8ae/0xd70 [ 275.394334][T10079] ? netlink_unicast+0x710/0x710 [ 275.394349][T10079] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 275.394363][T10079] ? apparmor_socket_sendmsg+0x2a/0x30 [ 275.394391][T10079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.417975][ T3879] kobject: 'loop5' (000000008dc3f6c8): kobject_uevent_env [ 275.420191][T10079] ? security_socket_sendmsg+0x8d/0xc0 [ 275.420209][T10079] ? netlink_unicast+0x710/0x710 [ 275.420224][T10079] sock_sendmsg+0xd7/0x130 [ 275.420237][T10079] ___sys_sendmsg+0x803/0x920 [ 275.420255][T10079] ? copy_msghdr_from_user+0x430/0x430 [ 275.426347][ T3879] kobject: 'loop5' (000000008dc3f6c8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 275.431798][T10079] ? kasan_check_read+0x11/0x20 [ 275.431812][T10079] ? __fget+0x381/0x550 [ 275.431826][T10079] ? ksys_dup3+0x3e0/0x3e0 [ 275.431841][T10079] ? lock_downgrade+0x880/0x880 [ 275.431854][T10079] ? __fget_light+0x1a9/0x230 [ 275.431864][T10079] ? __fdget+0x1b/0x20 [ 275.431883][T10079] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 275.665455][T10079] __sys_sendmsg+0x105/0x1d0 [ 275.671355][T10079] ? __ia32_sys_shutdown+0x80/0x80 [ 275.677084][T10079] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 275.683929][T10079] ? do_syscall_64+0x26/0x680 [ 275.689459][T10079] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.695677][T10079] ? do_syscall_64+0x26/0x680 [ 275.700995][T10079] __x64_sys_sendmsg+0x78/0xb0 [ 275.706777][T10079] do_syscall_64+0xfd/0x680 [ 275.712216][T10079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.719601][T10079] RIP: 0033:0x459279 [ 275.723939][T10079] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.749292][T10079] RSP: 002b:00007fefe862fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 275.758756][T10079] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 275.767559][T10079] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 275.776787][T10079] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 275.785700][T10079] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fefe86306d4 04:12:16 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000200)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5t\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv\x03Qa\xf3\xd4\xfc(\x83\xfb\xf8C\xf6\xcd\xca\xb1\x90\xeb\t~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\xc0\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1\x0fy\x12\x181\xa5|8\xc8\xe7\x9f@\xeb:\nJA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\x02\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0x7, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000540)={0xf2bf37, 0x5, 0x8, 0x6}, 0x10}, 0x70) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) 04:12:16 executing program 5: socket$kcm(0x2b, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x5, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r1 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf7, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000400)='cpu&00&_\n\x00\x01\b\x00\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) [ 275.794108][T10079] R13: 00000000004c6c94 R14: 00000000004dba90 R15: 00000000ffffffff [ 275.806243][T10079] Modules linked in: [ 275.812128][T10079] ---[ end trace 1e90e7c9b7956553 ]--- [ 275.819828][T10079] RIP: 0010:spin_dump.cold+0xa2/0xe6 [ 275.832087][T10079] Code: 4e 4d 02 00 e8 c5 52 bd 05 58 5b 41 5c 41 5d 41 5e 5d c3 48 8d bb d0 04 00 00 b8 ff ff 37 00 48 89 fa 48 c1 e0 2a 48 c1 ea 03 <0f> b6 04 02 84 c0 74 04 3c 03 7e 24 44 8b ab d0 04 00 00 48 81 c3 [ 275.869966][T10079] RSP: 0018:ffff88808a8b7538 EFLAGS: 00010207 [ 275.880384][T10079] RAX: dffffc0000000000 RBX: 00000000067bdf8e RCX: 0000000000000000 [ 275.894490][T10079] RDX: 0000000000cf7c8b RSI: ffffffff815ac7e6 RDI: 00000000067be45e [ 275.906282][T10079] RBP: ffff88808a8b7560 R08: 0000000000000036 R09: ffffed1015d26011 [ 275.919391][T10079] R10: ffffed1015d26010 R11: ffff8880ae930087 R12: ffff8880877a3ba8 [ 275.928569][T10079] R13: ffff888063bde340 R14: ffff8880877a2980 R15: ffff88808a8b75d8 [ 275.931914][T10088] kobject: 'hwsim2' (00000000a570d7fb): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim2' [ 275.938991][T10079] FS: 00007fefe8630700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 275.939001][T10079] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 275.939009][T10079] CR2: 0000000000738000 CR3: 00000000923f2000 CR4: 00000000001406e0 [ 275.939020][T10079] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 275.939027][T10079] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 275.939039][T10079] Kernel panic - not syncing: Fatal exception [ 275.966025][T10088] kobject: 'hwsim2' (00000000a570d7fb): kobject_uevent_env [ 275.976395][T10079] Kernel Offset: disabled [ 276.051174][T10079] Rebooting in 86400 seconds..