{0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, 0x0, 0xc1, 0x0) 01:07:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x800500}, 0x48) 01:07:19 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}, 0x48) 01:07:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, 0x0, 0xc1, 0x0) 01:07:19 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, 0x48) 01:07:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xe00000000000000]}, 0x48) 01:07:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x800600}, 0x48) 01:07:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 01:07:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xf00000000000000]}, 0x48) 01:07:19 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x800700}, 0x48) 01:07:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, 0x0, 0xc1, 0x0) 01:07:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0x48) 01:07:19 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b70200000344020cbfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x342020c00000000}, 0x48) 01:07:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1000000000000000]}, 0x48) 01:07:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58010000]}, 0x48) 01:07:19 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1501000000000000]}, 0x48) 01:07:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x800800}, 0x48) 01:07:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, 0x0, 0xc1, 0x0) 01:07:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cfa00000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4020000]}, 0x48) 01:07:19 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x48) 01:07:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x800900}, 0x48) 01:07:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x2000000000000000]}, 0x48) 01:07:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, 0x0, 0xc1, 0x0) 01:07:19 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11a]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) epoll_wait(r1, 0x0, 0xc1, 0x0) 01:07:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x48) 01:07:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x800a00}, 0x48) 01:07:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x3201000000000000]}, 0x48) 01:07:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) epoll_wait(r1, 0x0, 0xc1, 0x0) 01:07:19 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x500000000000000}, 0x48) 01:07:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 01:07:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x3e01000000000000]}, 0x48) 01:07:20 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c8]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x800b00}, 0x48) 01:07:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) epoll_wait(r1, 0x0, 0xc1, 0x0) 01:07:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 01:07:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x800c00}, 0x48) 01:07:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000]}, 0x48) 01:07:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x800d00}, 0x48) 01:07:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) 01:07:20 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x600000000000000}, 0x48) 01:07:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, 0x0) epoll_wait(r2, 0x0, 0xc1, 0x0) 01:07:20 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x501b060000000000]}, 0x48) 01:07:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cfa00000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 01:07:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x800e00}, 0x48) 01:07:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, 0x0) epoll_wait(r2, 0x0, 0xc1, 0x0) 01:07:20 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 01:07:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x5403000000000000]}, 0x48) 01:07:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x800f00}, 0x48) 01:07:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x5802000000000000]}, 0x48) 01:07:20 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x700000000000000}, 0x48) 01:07:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, 0x0) epoll_wait(r2, 0x0, 0xc1, 0x0) 01:07:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x801000}, 0x48) 01:07:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) 01:07:20 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x48) 01:07:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x6003000000000000]}, 0x48) 01:07:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(0xffffffffffffffff, 0x0, 0xc1, 0x0) 01:07:20 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cfa00000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) 01:07:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x801100}, 0x48) 01:07:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x6400000000000000]}, 0x48) 01:07:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(0xffffffffffffffff, 0x0, 0xc1, 0x0) 01:07:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x801200}, 0x48) 01:07:20 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) 01:07:20 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, 0x48) 01:07:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x7000000000000000]}, 0x48) 01:07:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(0xffffffffffffffff, 0x0, 0xc1, 0x0) 01:07:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x801300}, 0x48) 01:07:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) 01:07:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8000000000000000]}, 0x48) 01:07:20 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b70200000344020cbfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}, 0x48) 01:07:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=[@cred={{0x18}}], 0x18}, 0x0) 01:07:20 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x801400}, 0x48) 01:07:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x80ffffff00000000]}, 0x48) 01:07:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) 01:07:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x801500}, 0x48) 01:07:20 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 01:07:20 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}, 0x48) 01:07:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x90ffffff00000000]}, 0x48) 01:07:20 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) 01:07:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x801600}, 0x48) 01:07:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x9201000000000000]}, 0x48) 01:07:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x48) 01:07:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xaf01000000000000]}, 0x48) 01:07:20 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x80ffff}, 0x48) 01:07:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) 01:07:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x9, 0x8, 0x0, "e5"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 01:07:21 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc00000000000000}, 0x48) 01:07:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xc101000000000000]}, 0x48) 01:07:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0x48) 01:07:21 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa00000}, 0x48) 01:07:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xd42e060000000000]}, 0x48) 01:07:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, 0x48) 01:07:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa00100}, 0x48) 01:07:21 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa00200}, 0x48) 01:07:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x48) 01:07:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x9, 0x8, 0x0, "e5"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 01:07:21 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b70200000344020cbfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xd00000000000000}, 0x48) 01:07:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xe003000000000000]}, 0x48) 01:07:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa00300}, 0x48) 01:07:21 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x48) 01:07:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, 0x48) 01:07:21 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x2000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x841, 0x0) 01:07:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa00400}, 0x48) 01:07:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xe0ffffffffffffff]}, 0x48) 01:07:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa00500}, 0x48) 01:07:21 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xe801000000000000]}, 0x48) 01:07:21 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe00000000000000}, 0x48) 01:07:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cfa00000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 01:07:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa00600}, 0x48) 01:07:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) 01:07:21 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a01]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xf003000000000000]}, 0x48) 01:07:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61120400000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07006706000002000000070600000ee60000bf050000000000001f670000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 01:07:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa00700}, 0x48) 01:07:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5801000000000000]}, 0x48) 01:07:21 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}, 0x48) 01:07:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa00800}, 0x48) 01:07:21 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xfc03000000000000]}, 0x48) 01:07:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cfa00000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}, 0x48) 01:07:21 executing program 3: readv(0xffffffffffffffff, &(0x7f0000002480)=[{&(0x7f00000021c0)=""/182, 0xffffffffffffff08}], 0x1) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x941846247d779178, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x801, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x840) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) gettid() ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000b87bdd2af342cbb2454c82c677eb2b532a4bde7c225b1b6f5eb2d779a5ec78034807bfc92397f653506ea6866d6dfa1cb7b15bb5e941586ff6e2433f54afb2c34007274dcf265931e5242c761fc9ff6a5c5110c105"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000000)=@ipx={0x4, 0x0, 0x0, "f3cbafb12fc1"}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0c0583b, 0x20000001) r3 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000000080)='/dev/usbmon0\x00', 0x4802, 0x0) ioctl$FICLONE(r1, 0x40049409, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') preadv(r4, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f0000000040)="498a9a442186d26a0315e351faba8747", 0x10) 01:07:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa00900}, 0x48) 01:07:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) 01:07:21 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa402000000000000]}, 0x48) 01:07:21 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x48) 01:07:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa00a00}, 0x48) 01:07:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xff5fff5f00000000]}, 0x48) 01:07:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) 01:07:21 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xff9f000000000000]}, 0x48) 01:07:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa00b00}, 0x48) 01:07:22 executing program 3: readv(0xffffffffffffffff, &(0x7f0000002480)=[{&(0x7f00000021c0)=""/182, 0xffffffffffffff08}], 0x1) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x941846247d779178, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x801, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x840) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) gettid() ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000b87bdd2af342cbb2454c82c677eb2b532a4bde7c225b1b6f5eb2d779a5ec78034807bfc92397f653506ea6866d6dfa1cb7b15bb5e941586ff6e2433f54afb2c34007274dcf265931e5242c761fc9ff6a5c5110c105"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000000)=@ipx={0x4, 0x0, 0x0, "f3cbafb12fc1"}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0c0583b, 0x20000001) r3 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000000080)='/dev/usbmon0\x00', 0x4802, 0x0) ioctl$FICLONE(r1, 0x40049409, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') preadv(r4, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f0000000040)="498a9a442186d26a0315e351faba8747", 0x10) 01:07:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 01:07:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa00c00}, 0x48) 01:07:22 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:22 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x48) 01:07:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xffffc8ffffffffff]}, 0x48) 01:07:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x48) 01:07:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa00d00}, 0x48) 01:07:22 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xffffc900019a9000]}, 0x48) 01:07:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 01:07:22 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3000000000000000}, 0x48) 01:07:22 executing program 3: readv(0xffffffffffffffff, &(0x7f0000002480)=[{&(0x7f00000021c0)=""/182, 0xffffffffffffff08}], 0x1) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x941846247d779178, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x801, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x840) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) gettid() ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000b87bdd2af342cbb2454c82c677eb2b532a4bde7c225b1b6f5eb2d779a5ec78034807bfc92397f653506ea6866d6dfa1cb7b15bb5e941586ff6e2433f54afb2c34007274dcf265931e5242c761fc9ff6a5c5110c105"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000000)=@ipx={0x4, 0x0, 0x0, "f3cbafb12fc1"}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0c0583b, 0x20000001) r3 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000000080)='/dev/usbmon0\x00', 0x4802, 0x0) ioctl$FICLONE(r1, 0x40049409, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') preadv(r4, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f0000000040)="498a9a442186d26a0315e351faba8747", 0x10) 01:07:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xffffc90001a66000]}, 0x48) 01:07:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa00e00}, 0x48) 01:07:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa00f00}, 0x48) 01:07:22 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6500]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) 01:07:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 01:07:22 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}, 0x48) 01:07:22 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) 01:07:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xffffffffffc8ffff]}, 0x48) 01:07:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa01000}, 0x48) 01:07:22 executing program 3: readv(0xffffffffffffffff, &(0x7f0000002480)=[{&(0x7f00000021c0)=""/182, 0xffffffffffffff08}], 0x1) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x941846247d779178, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x801, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x840) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) gettid() ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000b87bdd2af342cbb2454c82c677eb2b532a4bde7c225b1b6f5eb2d779a5ec78034807bfc92397f653506ea6866d6dfa1cb7b15bb5e941586ff6e2433f54afb2c34007274dcf265931e5242c761fc9ff6a5c5110c105"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000000)=@ipx={0x4, 0x0, 0x0, "f3cbafb12fc1"}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0c0583b, 0x20000001) r3 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000000080)='/dev/usbmon0\x00', 0x4802, 0x0) ioctl$FICLONE(r1, 0x40049409, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') preadv(r4, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f0000000040)="498a9a442186d26a0315e351faba8747", 0x10) 01:07:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa01100}, 0x48) 01:07:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xffffffffffffffe0]}, 0x48) 01:07:22 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7800]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa01200}, 0x48) 01:07:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) 01:07:22 executing program 3: readv(0xffffffffffffffff, &(0x7f0000002480)=[{&(0x7f00000021c0)=""/182, 0xffffffffffffff08}], 0x1) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x941846247d779178, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x801, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x840) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) gettid() ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000b87bdd2af342cbb2454c82c677eb2b532a4bde7c225b1b6f5eb2d779a5ec78034807bfc92397f653506ea6866d6dfa1cb7b15bb5e941586ff6e2433f54afb2c34007274dcf265931e5242c761fc9ff6a5c5110c105"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000000)=@ipx={0x4, 0x0, 0x0, "f3cbafb12fc1"}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0c0583b, 0x20000001) r3 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000000080)='/dev/usbmon0\x00', 0x4802, 0x0) ioctl$FICLONE(r1, 0x40049409, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') preadv(r4, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f0000000040)="498a9a442186d26a0315e351faba8747", 0x10) 01:07:22 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x48) 01:07:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x48) 01:07:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa01300}, 0x48) 01:07:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) 01:07:22 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fff]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa01400}, 0x48) 01:07:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 01:07:22 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc802]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) 01:07:22 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}, 0x48) 01:07:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) 01:07:22 executing program 3: write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x4) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) open(0x0, 0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000280)={0x13, 0x65, 0xffff, 0x9, 0x6, '9P2000'}, 0x13) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 01:07:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa01500}, 0x48) 01:07:22 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 01:07:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) 01:07:22 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b70200000344020cbfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6500000000000000}, 0x48) 01:07:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) 01:07:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa01600}, 0x48) 01:07:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x48) 01:07:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) 01:07:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) 01:07:22 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:22 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup\x00\x1e\xa7\xd4\xea.G\x1c\x99\xa6\xb45\xfd\xbe\x80l(i\xe0\xda\x1e\xb5\x94\xf1y\xc8.\xe2c\xb8\xa0\xe8\xe2\xa2(\\y<;\xc1$<\x8c5B?1\xe3\xba\x96Z/\xf5\xce0\xc5\x86\xcf\xad\'v\xbe\xfb\xb6\x8e\xb7>\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000740)=0xfffc, 0x1ff) read(0xffffffffffffffff, &(0x7f0000000780)=""/238, 0x48e) 01:07:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x10]}, 0x48) 01:07:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xc00a00}, 0x48) 01:07:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) 01:07:23 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b70200000344020cbfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc0ffffff00000000}, 0x48) 01:07:23 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup\x00\x1e\xa7\xd4\xea.G\x1c\x99\xa6\xb45\xfd\xbe\x80l(i\xe0\xda\x1e\xb5\x94\xf1y\xc8.\xe2c\xb8\xa0\xe8\xe2\xa2(\\y<;\xc1$<\x8c5B?1\xe3\xba\x96Z/\xf5\xce0\xc5\x86\xcf\xad\'v\xbe\xfb\xb6\x8e\xb7>\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000740)=0xfffc, 0x1ff) read(0xffffffffffffffff, &(0x7f0000000780)=""/238, 0x48e) 01:07:23 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1cc000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x30]}, 0x48) 01:07:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) 01:07:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xc00b00}, 0x48) 01:07:24 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup\x00\x1e\xa7\xd4\xea.G\x1c\x99\xa6\xb45\xfd\xbe\x80l(i\xe0\xda\x1e\xb5\x94\xf1y\xc8.\xe2c\xb8\xa0\xe8\xe2\xa2(\\y<;\xc1$<\x8c5B?1\xe3\xba\x96Z/\xf5\xce0\xc5\x86\xcf\xad\'v\xbe\xfb\xb6\x8e\xb7>\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000740)=0xfffc, 0x1ff) read(0xffffffffffffffff, &(0x7f0000000780)=""/238, 0x48e) 01:07:24 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x50]}, 0x48) 01:07:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0x48) 01:07:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xc00c00}, 0x48) 01:07:24 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b70200000344020cbfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xd0ffffff00000000}, 0x48) 01:07:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) 01:07:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x60]}, 0x48) 01:07:24 executing program 3: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000740)=0xfffc, 0x1ff) read(r1, &(0x7f0000000780)=""/238, 0x48e) 01:07:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cfa00000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 01:07:24 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xe00300}, 0x48) 01:07:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x132]}, 0x48) 01:07:25 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup\x00\x1e\xa7\xd4\xea.G\x1c\x99\xa6\xb45\xfd\xbe\x80l(i\xe0\xda\x1e\xb5\x94\xf1y\xc8.\xe2c\xb8\xa0\xe8\xe2\xa2(\\y<;\xc1$<\x8c5B?1\xe3\xba\x96Z/\xf5\xce0\xc5\x86\xcf\xad\'v\xbe\xfb\xb6\x8e\xb7>\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000740)=0xfffc, 0x1ff) read(r1, &(0x7f0000000780)=""/238, 0x48e) 01:07:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cfa00000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) 01:07:25 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2]}, 0x48) 01:07:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xe00400}, 0x48) 01:07:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x13e]}, 0x48) 01:07:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) 01:07:25 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa01c00]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:25 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup\x00\x1e\xa7\xd4\xea.G\x1c\x99\xa6\xb45\xfd\xbe\x80l(i\xe0\xda\x1e\xb5\x94\xf1y\xc8.\xe2c\xb8\xa0\xe8\xe2\xa2(\\y<;\xc1$<\x8c5B?1\xe3\xba\x96Z/\xf5\xce0\xc5\x86\xcf\xad\'v\xbe\xfb\xb6\x8e\xb7>\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000740)=0xfffc, 0x1ff) read(r1, &(0x7f0000000780)=""/238, 0x48e) 01:07:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xe00500}, 0x48) 01:07:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x192]}, 0x48) 01:07:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xe00600}, 0x48) 01:07:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1af]}, 0x48) 01:07:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) 01:07:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xe00700}, 0x48) 01:07:25 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x3]}, 0x48) 01:07:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1c1]}, 0x48) 01:07:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xe00800}, 0x48) 01:07:25 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup\x00\x1e\xa7\xd4\xea.G\x1c\x99\xa6\xb45\xfd\xbe\x80l(i\xe0\xda\x1e\xb5\x94\xf1y\xc8.\xe2c\xb8\xa0\xe8\xe2\xa2(\\y<;\xc1$<\x8c5B?1\xe3\xba\x96Z/\xf5\xce0\xc5\x86\xcf\xad\'v\xbe\xfb\xb6\x8e\xb7>\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$key(0xf, 0x3, 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x800001d, 0x0) 01:07:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x40070000000000}, 0x48) 01:07:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x48) 01:07:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xe00300]}, 0x48) 01:07:34 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x40080000000000}, 0x48) 01:07:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0xa}, 0x48) 01:07:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 01:07:34 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x7000000]}, 0x48) 01:07:34 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 01:07:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x40090000000000}, 0x48) 01:07:34 executing program 3: 01:07:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0xd}, 0x48) 01:07:34 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a01000000000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) 01:07:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x400a0000000000}, 0x48) 01:07:34 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x8000000]}, 0x48) 01:07:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cfa00000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0xe}, 0x48) 01:07:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) 01:07:34 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b70200000344020cbfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x9000000]}, 0x48) 01:07:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0xf4240}, 0x48) 01:07:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x400b0000000000}, 0x48) 01:07:34 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:34 executing program 3: 01:07:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4030000]}, 0x48) 01:07:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x400c0000000000}, 0x48) 01:07:34 executing program 3: 01:07:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cfa00000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}}, 0x48) 01:07:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) 01:07:35 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000000000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:35 executing program 3: 01:07:35 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0xa000000]}, 0x48) 01:07:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) 01:07:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x400d0000000000}, 0x48) 01:07:35 executing program 3: 01:07:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cfa00000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3}}, 0x48) 01:07:35 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6010000]}, 0x48) 01:07:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x400e0000000000}, 0x48) 01:07:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4}}, 0x48) 01:07:35 executing program 3: 01:07:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x5}}, 0x48) 01:07:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) 01:07:35 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0xb000000]}, 0x48) 01:07:35 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}}, 0x48) 01:07:35 executing program 3: 01:07:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x400f0000000000}, 0x48) 01:07:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x48) 01:07:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x7}}, 0x48) 01:07:35 executing program 3: 01:07:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x40100000000000}, 0x48) 01:07:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x48) 01:07:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8}}, 0x48) 01:07:35 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:35 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0xc000000]}, 0x48) 01:07:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x40110000000000}, 0x48) 01:07:35 executing program 3: 01:07:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) 01:07:35 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x637b090000000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:35 executing program 3: 01:07:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cfa00000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x9}}, 0x48) 01:07:35 executing program 3: 01:07:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xb000000]}, 0x48) 01:07:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x40120000000000}, 0x48) 01:07:35 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b70200000344020cbfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0xc024203]}, 0x48) 01:07:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cfa00000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}}, 0x48) 01:07:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x40130000000000}, 0x48) 01:07:35 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6500000000000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:35 executing program 3: 01:07:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xd000000]}, 0x48) 01:07:35 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0xd000000]}, 0x48) 01:07:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cfa00000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xb}}, 0x48) 01:07:35 executing program 3: 01:07:35 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000000000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x40140000000000}, 0x48) 01:07:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0x48) 01:07:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xd}}, 0x48) 01:07:35 executing program 3: 01:07:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x40150000000000}, 0x48) 01:07:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0x48) 01:07:36 executing program 3: 01:07:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xe}}, 0x48) 01:07:36 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b70200000344020cbfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0xe000000]}, 0x48) 01:07:36 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7800000000000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x48) 01:07:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x40160000000000}, 0x48) 01:07:36 executing program 3: 01:07:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x10}}, 0x48) 01:07:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x15010000]}, 0x48) 01:07:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x401c0000000000}, 0x48) 01:07:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x158}}, 0x48) 01:07:36 executing program 3: 01:07:36 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:36 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0xf000000]}, 0x48) 01:07:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x20000000]}, 0x48) 01:07:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x50d20500c9ffff}, 0x48) 01:07:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2a4}}, 0x48) 01:07:36 executing program 3: 01:07:36 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x32010000]}, 0x48) 01:07:36 executing program 3: 01:07:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x60000000000000}, 0x48) 01:07:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x300}}, 0x48) 01:07:36 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90ffffff00000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3e010000]}, 0x48) 01:07:36 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x10000000]}, 0x48) 01:07:36 executing program 3: 01:07:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 01:07:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x500}}, 0x48) 01:07:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x60010000000000}, 0x48) 01:07:36 executing program 3: 01:07:36 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0ffffff00000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:36 executing program 3: 01:07:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x600}}, 0x48) 01:07:36 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b70200000344020cbfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x20000000]}, 0x48) 01:07:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0x48) 01:07:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x60020000000000}, 0x48) 01:07:36 executing program 3: 01:07:36 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0ffffff00000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x700}}, 0x48) 01:07:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x60030000000000}, 0x48) 01:07:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x501b0600]}, 0x48) 01:07:36 executing program 3: 01:07:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x54030000]}, 0x48) 01:07:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x60040000000000}, 0x48) 01:07:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x900}}, 0x48) 01:07:36 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x30000000]}, 0x48) 01:07:36 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc802000000000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:36 executing program 3: 01:07:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x60050000000000}, 0x48) 01:07:36 executing program 3: 01:07:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cfa00000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa00}}, 0x48) 01:07:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x58020000]}, 0x48) 01:07:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x60060000000000}, 0x48) 01:07:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xb00}}, 0x48) 01:07:36 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0ffffff00000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:36 executing program 3: 01:07:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x5fff5fff]}, 0x48) 01:07:36 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x3f000000]}, 0x48) 01:07:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x60070000000000}, 0x48) 01:07:36 executing program 3: 01:07:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xd00}}, 0x48) 01:07:36 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:36 executing program 3: 01:07:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x60080000000000}, 0x48) 01:07:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x60030000]}, 0x48) 01:07:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xe00}}, 0x48) 01:07:36 executing program 3: 01:07:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x64000000]}, 0x48) 01:07:36 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f000000000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:36 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x40000000]}, 0x48) 01:07:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x60090000000000}, 0x48) 01:07:37 executing program 3: 01:07:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x70000000]}, 0x48) 01:07:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x600a0000000000}, 0x48) 01:07:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cfa00000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2000}}, 0x48) 01:07:37 executing program 3: 01:07:37 executing program 3: 01:07:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3f00}}, 0x48) 01:07:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x80ffffff]}, 0x48) 01:07:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x600b0000000000}, 0x48) 01:07:37 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffe5f00000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:37 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b70200000344020cbfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x5fff5fff]}, 0x48) 01:07:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x90ffffff]}, 0x48) 01:07:37 executing program 3: 01:07:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x600c0000000000}, 0x48) 01:07:37 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffc8ffffffffff]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4000}}, 0x48) 01:07:37 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x408200, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r3, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) r7 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x5, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r6, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={r8, 0x1000, 0x8}, 0xc) r9 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0x2, 0x200000001, 0x84) sendmsg$kcm(r10, &(0x7f0000000340)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000080)='\'', 0x1}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x1000, 0x0, 0x6, 0x0, 0xb7, 0x80, 0x20af8f73f23954e6, 0x7, 0x0, 0x9, 0x8, 0x8, 0x5, 0x1f, 0x400, 0x0, 0x3, 0x0, 0x4, 0x7fffffff, 0x8, 0xfffffffffffffffa, 0x6, 0x3115, 0x2, 0x7000, 0x80, 0x9, 0x3c7, 0x0, 0x3, 0x6, 0x4, 0x800, 0xfffffffffffffffc, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000540), 0xb}, 0x202, 0xd30e, 0x8, 0x7, 0x9, 0x5, 0x10001}, r7, 0x0, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000380)=""/124, 0x7c}, {&(0x7f0000000440)=""/194, 0xc2}], 0x2, &(0x7f0000000200)=""/60, 0x3c}, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r9) write$cgroup_int(r4, 0x0, 0x0) 01:07:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x600d0000000000}, 0x48) 01:07:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x92010000]}, 0x48) 01:07:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x5801}}, 0x48) 01:07:37 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x60000000]}, 0x48) 01:07:37 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffc90001939000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xaf010000]}, 0x48) 01:07:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x600e0000000000}, 0x48) 01:07:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa402}}, 0x48) 01:07:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xc1010000]}, 0x48) 01:07:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xff00}}, 0x48) 01:07:37 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 2025.767177][T28342] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2025.795661][T28342] CPU: 1 PID: 28342 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #86 [ 2025.803714][T28342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2025.803717][T28342] Call Trace: [ 2025.803732][T28342] dump_stack+0x1d8/0x2f8 [ 2025.803743][T28342] dump_header+0xd8/0x960 [ 2025.803754][T28342] oom_kill_process+0xcd/0x350 [ 2025.803763][T28342] out_of_memory+0x5c8/0x880 [ 2025.803775][T28342] memory_max_write+0x4ba/0x600 [ 2025.803789][T28342] ? memory_max_show+0xa0/0xa0 [ 2025.803799][T28342] cgroup_file_write+0x223/0x5f0 [ 2025.803810][T28342] ? cgroup_seqfile_stop+0xc0/0xc0 [ 2025.854460][T28342] kernfs_fop_write+0x3e4/0x4f0 [ 2025.859274][T28342] ? kernfs_fop_read+0x580/0x580 [ 2025.864178][T28342] __vfs_write+0xb8/0x740 [ 2025.868474][T28342] ? check_preemption_disabled+0x3a/0x2a0 [ 2025.874158][T28342] ? __sb_start_write+0x403/0x4c0 [ 2025.879145][T28342] vfs_write+0x275/0x590 [ 2025.883361][T28342] ksys_write+0x117/0x220 [ 2025.887654][T28342] __x64_sys_write+0x7b/0x90 [ 2025.892213][T28342] do_syscall_64+0xfe/0x140 [ 2025.896682][T28342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2025.902538][T28342] RIP: 0033:0x459829 [ 2025.906405][T28342] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2025.925979][T28342] RSP: 002b:00007f381ea38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2025.934360][T28342] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 2025.942300][T28342] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 2025.950243][T28342] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2025.958183][T28342] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f381ea396d4 [ 2025.966119][T28342] R13: 00000000004c99a3 R14: 00000000004e1028 R15: 00000000ffffffff [ 2025.993974][T28342] memory: usage 86552kB, limit 0kB, failcnt 2627 [ 2026.007513][T28342] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2026.019752][T28342] Memory cgroup stats for /syz3: [ 2026.020857][T28342] anon 68259840 [ 2026.020857][T28342] file 147456 [ 2026.020857][T28342] kernel_stack 983040 [ 2026.020857][T28342] slab 15163392 [ 2026.020857][T28342] sock 0 [ 2026.020857][T28342] shmem 0 [ 2026.020857][T28342] file_mapped 0 [ 2026.020857][T28342] file_dirty 0 [ 2026.020857][T28342] file_writeback 0 [ 2026.020857][T28342] anon_thp 65011712 [ 2026.020857][T28342] inactive_anon 57344 [ 2026.020857][T28342] active_anon 68321280 [ 2026.020857][T28342] inactive_file 0 [ 2026.020857][T28342] active_file 0 [ 2026.020857][T28342] unevictable 0 [ 2026.020857][T28342] slab_reclaimable 5271552 [ 2026.020857][T28342] slab_unreclaimable 9891840 [ 2026.020857][T28342] pgfault 1184238 [ 2026.020857][T28342] pgmajfault 0 [ 2026.020857][T28342] workingset_refault 0 [ 2026.020857][T28342] workingset_activate 0 [ 2026.020857][T28342] workingset_nodereclaim 0 [ 2026.020857][T28342] pgrefill 63 [ 2026.020857][T28342] pgscan 36232 [ 2026.020857][T28342] pgsteal 36223 [ 2026.020857][T28342] pgactivate 0 [ 2026.120653][T28342] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=28341,uid=0 [ 2026.136725][T28342] Memory cgroup out of memory: Killed process 28341 (syz-executor.3) total-vm:72576kB, anon-rss:4200kB, file-rss:34816kB, shmem-rss:0kB [ 2026.160716][ T1057] oom_reaper: reaped process 28341 (syz-executor.3), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 01:07:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x408200, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r3, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) r7 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x5, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r6, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={r8, 0x1000, 0x8}, 0xc) r9 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0x2, 0x200000001, 0x84) sendmsg$kcm(r10, &(0x7f0000000340)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000080)='\'', 0x1}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x1000, 0x0, 0x6, 0x0, 0xb7, 0x80, 0x20af8f73f23954e6, 0x7, 0x0, 0x9, 0x8, 0x8, 0x5, 0x1f, 0x400, 0x0, 0x3, 0x0, 0x4, 0x7fffffff, 0x8, 0xfffffffffffffffa, 0x6, 0x3115, 0x2, 0x7000, 0x80, 0x9, 0x3c7, 0x0, 0x3, 0x6, 0x4, 0x800, 0xfffffffffffffffc, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000540), 0xb}, 0x202, 0xd30e, 0x8, 0x7, 0x9, 0x5, 0x10001}, r7, 0x0, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000380)=""/124, 0x7c}, {&(0x7f0000000440)=""/194, 0xc2}], 0x2, &(0x7f0000000200)=""/60, 0x3c}, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r9) write$cgroup_int(r4, 0x0, 0x0) 01:07:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x600f0000000000}, 0x48) 01:07:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x200000}}, 0x48) 01:07:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xd42e0600]}, 0x48) 01:07:38 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x65000000]}, 0x48) 01:07:38 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0008000]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x1000000}}, 0x48) 01:07:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xe0030000]}, 0x48) 01:07:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x60100000000000}, 0x48) [ 2026.508512][T28062] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2026.551735][T28062] CPU: 1 PID: 28062 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #86 [ 2026.559707][T28062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2026.559710][T28062] Call Trace: [ 2026.559723][T28062] dump_stack+0x1d8/0x2f8 [ 2026.559733][T28062] dump_header+0xd8/0x960 [ 2026.559743][T28062] oom_kill_process+0xcd/0x350 [ 2026.559751][T28062] out_of_memory+0x5c8/0x880 [ 2026.559761][T28062] try_charge+0x125a/0x1910 [ 2026.559778][T28062] __memcg_kmem_charge+0x146/0x500 [ 2026.559790][T28062] __alloc_pages_nodemask+0x29a/0x5d0 [ 2026.559802][T28062] copy_process+0x57e/0x5ac0 [ 2026.610562][T28062] ? __kasan_check_write+0x14/0x20 [ 2026.615646][T28062] ? __might_fault+0xf9/0x160 [ 2026.620321][T28062] _do_fork+0x13f/0x5b0 [ 2026.624444][T28062] ? debug_smp_processor_id+0x1c/0x20 [ 2026.629778][T28062] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 2026.635807][T28062] __x64_sys_clone+0x1ec/0x230 [ 2026.640545][T28062] do_syscall_64+0xfe/0x140 [ 2026.645036][T28062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2026.650902][T28062] RIP: 0033:0x457dfa [ 2026.654765][T28062] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2026.674340][T28062] RSP: 002b:00007ffd1398a7b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2026.682711][T28062] RAX: ffffffffffffffda RBX: 00007ffd1398a7b0 RCX: 0000000000457dfa [ 2026.690739][T28062] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 01:07:38 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffc8ffff]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 2026.698680][T28062] RBP: 00007ffd1398a7f0 R08: 0000000000000001 R09: 0000555555c3b940 [ 2026.706615][T28062] R10: 0000555555c3bc10 R11: 0000000000000246 R12: 0000000000000001 [ 2026.714566][T28062] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd1398a840 [ 2026.732411][T28062] memory: usage 82148kB, limit 0kB, failcnt 2635 [ 2026.738735][T28062] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2026.766525][T28062] Memory cgroup stats for /syz3: [ 2026.766585][T28062] anon 63995904 [ 2026.766585][T28062] file 147456 [ 2026.766585][T28062] kernel_stack 983040 [ 2026.766585][T28062] slab 15163392 [ 2026.766585][T28062] sock 0 [ 2026.766585][T28062] shmem 0 [ 2026.766585][T28062] file_mapped 0 [ 2026.766585][T28062] file_dirty 0 [ 2026.766585][T28062] file_writeback 0 [ 2026.766585][T28062] anon_thp 60817408 [ 2026.766585][T28062] inactive_anon 57344 [ 2026.766585][T28062] active_anon 64057344 [ 2026.766585][T28062] inactive_file 0 01:07:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xe0ffffff]}, 0x48) 01:07:38 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b70200000344020cbfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x70000000]}, 0x48) [ 2026.766585][T28062] active_file 0 [ 2026.766585][T28062] unevictable 0 [ 2026.766585][T28062] slab_reclaimable 5271552 [ 2026.766585][T28062] slab_unreclaimable 9891840 [ 2026.766585][T28062] pgfault 1184271 [ 2026.766585][T28062] pgmajfault 0 [ 2026.766585][T28062] workingset_refault 0 [ 2026.766585][T28062] workingset_activate 0 [ 2026.766585][T28062] workingset_nodereclaim 0 [ 2026.766585][T28062] pgrefill 63 [ 2026.766585][T28062] pgscan 36232 [ 2026.766585][T28062] pgsteal 36223 [ 2026.766585][T28062] pgactivate 0 [ 2026.879071][T28062] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=1763,uid=0 [ 2026.896445][T28062] Memory cgroup out of memory: Killed process 1763 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2026.921936][T28062] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2026.933952][T28062] CPU: 0 PID: 28062 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #86 [ 2026.941908][T28062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2026.941912][T28062] Call Trace: [ 2026.941924][T28062] dump_stack+0x1d8/0x2f8 [ 2026.941934][T28062] dump_header+0xd8/0x960 [ 2026.941943][T28062] oom_kill_process+0xcd/0x350 [ 2026.941952][T28062] out_of_memory+0x5c8/0x880 [ 2026.941962][T28062] try_charge+0x125a/0x1910 [ 2026.941979][T28062] __memcg_kmem_charge+0x146/0x500 [ 2026.941991][T28062] __alloc_pages_nodemask+0x29a/0x5d0 [ 2026.942002][T28062] copy_process+0x57e/0x5ac0 [ 2026.942012][T28062] ? __kasan_check_write+0x14/0x20 [ 2026.997625][T28062] ? __might_fault+0xf9/0x160 [ 2027.002269][T28062] _do_fork+0x13f/0x5b0 [ 2027.006409][T28062] ? debug_smp_processor_id+0x1c/0x20 [ 2027.011751][T28062] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 2027.017809][T28062] __x64_sys_clone+0x1ec/0x230 [ 2027.022541][T28062] do_syscall_64+0xfe/0x140 [ 2027.027010][T28062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2027.032864][T28062] RIP: 0033:0x457dfa [ 2027.036723][T28062] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2027.056317][T28062] RSP: 002b:00007ffd1398a7b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2027.064687][T28062] RAX: ffffffffffffffda RBX: 00007ffd1398a7b0 RCX: 0000000000457dfa [ 2027.072626][T28062] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2027.080567][T28062] RBP: 00007ffd1398a7f0 R08: 0000000000000001 R09: 0000555555c3b940 [ 2027.088515][T28062] R10: 0000555555c3bc10 R11: 0000000000000246 R12: 0000000000000001 [ 2027.096454][T28062] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd1398a840 [ 2027.105439][T28062] memory: usage 79832kB, limit 0kB, failcnt 2641 [ 2027.111907][T28062] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2027.118869][T28062] Memory cgroup stats for /syz3: [ 2027.118931][T28062] anon 61837312 [ 2027.118931][T28062] file 147456 [ 2027.118931][T28062] kernel_stack 983040 [ 2027.118931][T28062] slab 15163392 [ 2027.118931][T28062] sock 0 [ 2027.118931][T28062] shmem 0 [ 2027.118931][T28062] file_mapped 0 [ 2027.118931][T28062] file_dirty 0 [ 2027.118931][T28062] file_writeback 0 [ 2027.118931][T28062] anon_thp 58720256 [ 2027.118931][T28062] inactive_anon 57344 [ 2027.118931][T28062] active_anon 61837312 [ 2027.118931][T28062] inactive_file 0 [ 2027.118931][T28062] active_file 0 [ 2027.118931][T28062] unevictable 0 [ 2027.118931][T28062] slab_reclaimable 5271552 [ 2027.118931][T28062] slab_unreclaimable 9891840 [ 2027.118931][T28062] pgfault 1184271 [ 2027.118931][T28062] pgmajfault 0 [ 2027.118931][T28062] workingset_refault 0 [ 2027.118931][T28062] workingset_activate 0 [ 2027.118931][T28062] workingset_nodereclaim 0 [ 2027.118931][T28062] pgrefill 63 [ 2027.118931][T28062] pgscan 36232 [ 2027.118931][T28062] pgsteal 36223 [ 2027.118931][T28062] pgactivate 0 [ 2027.215588][T28062] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=1736,uid=0 [ 2027.231469][T28062] Memory cgroup out of memory: Killed process 1736 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2027.265665][T28062] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2027.280192][T28062] CPU: 1 PID: 28062 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #86 [ 2027.288148][T28062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2027.298190][T28062] Call Trace: [ 2027.301458][T28062] dump_stack+0x1d8/0x2f8 [ 2027.305790][T28062] dump_header+0xd8/0x960 [ 2027.310105][T28062] oom_kill_process+0xcd/0x350 [ 2027.314855][T28062] out_of_memory+0x5c8/0x880 [ 2027.319424][T28062] try_charge+0x125a/0x1910 [ 2027.323915][T28062] __memcg_kmem_charge+0x146/0x500 [ 2027.329005][T28062] __alloc_pages_nodemask+0x29a/0x5d0 [ 2027.334356][T28062] copy_process+0x57e/0x5ac0 [ 2027.338927][T28062] ? __kasan_check_write+0x14/0x20 [ 2027.344026][T28062] ? __might_fault+0xf9/0x160 [ 2027.348683][T28062] _do_fork+0x13f/0x5b0 [ 2027.352836][T28062] ? debug_smp_processor_id+0x1c/0x20 [ 2027.358189][T28062] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 2027.364241][T28062] __x64_sys_clone+0x1ec/0x230 [ 2027.368993][T28062] do_syscall_64+0xfe/0x140 [ 2027.373477][T28062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2027.379373][T28062] RIP: 0033:0x457dfa [ 2027.383253][T28062] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2027.402833][T28062] RSP: 002b:00007ffd1398a7b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2027.411223][T28062] RAX: ffffffffffffffda RBX: 00007ffd1398a7b0 RCX: 0000000000457dfa [ 2027.419170][T28062] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2027.427118][T28062] RBP: 00007ffd1398a7f0 R08: 0000000000000001 R09: 0000555555c3b940 [ 2027.435067][T28062] R10: 0000555555c3bc10 R11: 0000000000000246 R12: 0000000000000001 [ 2027.443022][T28062] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd1398a840 [ 2027.456423][T28062] memory: usage 76836kB, limit 0kB, failcnt 2647 [ 2027.463064][T28062] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2027.469953][T28062] Memory cgroup stats for /syz3: [ 2027.470020][T28062] anon 59641856 [ 2027.470020][T28062] file 147456 [ 2027.470020][T28062] kernel_stack 917504 [ 2027.470020][T28062] slab 14581760 [ 2027.470020][T28062] sock 0 [ 2027.470020][T28062] shmem 0 [ 2027.470020][T28062] file_mapped 0 [ 2027.470020][T28062] file_dirty 0 [ 2027.470020][T28062] file_writeback 0 [ 2027.470020][T28062] anon_thp 56623104 [ 2027.470020][T28062] inactive_anon 57344 [ 2027.470020][T28062] active_anon 59641856 [ 2027.470020][T28062] inactive_file 0 [ 2027.470020][T28062] active_file 0 [ 2027.470020][T28062] unevictable 0 [ 2027.470020][T28062] slab_reclaimable 5271552 [ 2027.470020][T28062] slab_unreclaimable 9310208 [ 2027.470020][T28062] pgfault 1184271 [ 2027.470020][T28062] pgmajfault 0 [ 2027.470020][T28062] workingset_refault 0 [ 2027.470020][T28062] workingset_activate 0 [ 2027.470020][T28062] workingset_nodereclaim 0 [ 2027.470020][T28062] pgrefill 63 [ 2027.470020][T28062] pgscan 36232 [ 2027.470020][T28062] pgsteal 36223 [ 2027.470020][T28062] pgactivate 0 [ 2027.566024][T28062] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=1647,uid=0 [ 2027.581594][T28062] Memory cgroup out of memory: Killed process 1647 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2027.604359][T28062] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2027.616236][T28062] CPU: 1 PID: 28062 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #86 [ 2027.624192][T28062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2027.634247][T28062] Call Trace: [ 2027.637514][T28062] dump_stack+0x1d8/0x2f8 [ 2027.641819][T28062] dump_header+0xd8/0x960 [ 2027.646125][T28062] oom_kill_process+0xcd/0x350 [ 2027.650878][T28062] out_of_memory+0x5c8/0x880 [ 2027.655456][T28062] try_charge+0x125a/0x1910 [ 2027.659961][T28062] __memcg_kmem_charge+0x146/0x500 [ 2027.665050][T28062] __alloc_pages_nodemask+0x29a/0x5d0 [ 2027.670496][T28062] copy_process+0x57e/0x5ac0 [ 2027.675099][T28062] ? __kasan_check_write+0x14/0x20 [ 2027.680198][T28062] ? __might_fault+0xf9/0x160 [ 2027.684868][T28062] _do_fork+0x13f/0x5b0 [ 2027.689009][T28062] ? debug_smp_processor_id+0x1c/0x20 [ 2027.694362][T28062] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 2027.700404][T28062] __x64_sys_clone+0x1ec/0x230 [ 2027.705146][T28062] do_syscall_64+0xfe/0x140 [ 2027.709626][T28062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2027.715501][T28062] RIP: 0033:0x457dfa [ 2027.719370][T28062] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2027.738977][T28062] RSP: 002b:00007ffd1398a7b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2027.747376][T28062] RAX: ffffffffffffffda RBX: 00007ffd1398a7b0 RCX: 0000000000457dfa [ 2027.755321][T28062] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2027.763278][T28062] RBP: 00007ffd1398a7f0 R08: 0000000000000001 R09: 0000555555c3b940 [ 2027.771227][T28062] R10: 0000555555c3bc10 R11: 0000000000000246 R12: 0000000000000001 [ 2027.779174][T28062] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd1398a840 [ 2027.787446][T28062] memory: usage 74500kB, limit 0kB, failcnt 2653 [ 2027.793778][T28062] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2027.800639][T28062] Memory cgroup stats for /syz3: [ 2027.800696][T28062] anon 57438208 [ 2027.800696][T28062] file 147456 [ 2027.800696][T28062] kernel_stack 917504 [ 2027.800696][T28062] slab 14581760 [ 2027.800696][T28062] sock 0 [ 2027.800696][T28062] shmem 0 [ 2027.800696][T28062] file_mapped 0 [ 2027.800696][T28062] file_dirty 0 [ 2027.800696][T28062] file_writeback 0 [ 2027.800696][T28062] anon_thp 54525952 [ 2027.800696][T28062] inactive_anon 57344 [ 2027.800696][T28062] active_anon 57438208 [ 2027.800696][T28062] inactive_file 0 [ 2027.800696][T28062] active_file 0 [ 2027.800696][T28062] unevictable 0 [ 2027.800696][T28062] slab_reclaimable 5271552 [ 2027.800696][T28062] slab_unreclaimable 9310208 [ 2027.800696][T28062] pgfault 1184271 [ 2027.800696][T28062] pgmajfault 0 [ 2027.800696][T28062] workingset_refault 0 [ 2027.800696][T28062] workingset_activate 0 [ 2027.800696][T28062] workingset_nodereclaim 0 [ 2027.800696][T28062] pgrefill 63 [ 2027.800696][T28062] pgscan 36232 [ 2027.800696][T28062] pgsteal 36223 [ 2027.800696][T28062] pgactivate 0 [ 2027.896652][T28062] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=1520,uid=0 [ 2027.912210][T28062] Memory cgroup out of memory: Killed process 1520 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2027.935065][T28062] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2027.946892][T28062] CPU: 1 PID: 28062 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #86 [ 2027.954869][T28062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2027.964906][T28062] Call Trace: [ 2027.968183][T28062] dump_stack+0x1d8/0x2f8 [ 2027.972489][T28062] dump_header+0xd8/0x960 [ 2027.976798][T28062] oom_kill_process+0xcd/0x350 [ 2027.981564][T28062] out_of_memory+0x5c8/0x880 [ 2027.986138][T28062] try_charge+0x125a/0x1910 [ 2027.990632][T28062] __memcg_kmem_charge+0x146/0x500 [ 2027.995725][T28062] __alloc_pages_nodemask+0x29a/0x5d0 [ 2028.001077][T28062] copy_process+0x57e/0x5ac0 [ 2028.005642][T28062] ? __kasan_check_write+0x14/0x20 [ 2028.010747][T28062] ? __might_fault+0xf9/0x160 [ 2028.015412][T28062] _do_fork+0x13f/0x5b0 [ 2028.019548][T28062] ? debug_smp_processor_id+0x1c/0x20 [ 2028.024907][T28062] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 2028.030952][T28062] __x64_sys_clone+0x1ec/0x230 [ 2028.035715][T28062] do_syscall_64+0xfe/0x140 [ 2028.040198][T28062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2028.046060][T28062] RIP: 0033:0x457dfa [ 2028.049935][T28062] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2028.069515][T28062] RSP: 002b:00007ffd1398a7b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2028.077901][T28062] RAX: ffffffffffffffda RBX: 00007ffd1398a7b0 RCX: 0000000000457dfa [ 2028.085854][T28062] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2028.093806][T28062] RBP: 00007ffd1398a7f0 R08: 0000000000000001 R09: 0000555555c3b940 [ 2028.101768][T28062] R10: 0000555555c3bc10 R11: 0000000000000246 R12: 0000000000000001 [ 2028.109720][T28062] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd1398a840 [ 2028.118003][T28062] memory: usage 72184kB, limit 0kB, failcnt 2659 [ 2028.124394][T28062] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2028.131510][T28062] Memory cgroup stats for /syz3: [ 2028.131573][T28062] anon 55234560 [ 2028.131573][T28062] file 147456 [ 2028.131573][T28062] kernel_stack 851968 [ 2028.131573][T28062] slab 14581760 [ 2028.131573][T28062] sock 0 [ 2028.131573][T28062] shmem 0 [ 2028.131573][T28062] file_mapped 0 [ 2028.131573][T28062] file_dirty 0 [ 2028.131573][T28062] file_writeback 0 [ 2028.131573][T28062] anon_thp 52428800 [ 2028.131573][T28062] inactive_anon 57344 [ 2028.131573][T28062] active_anon 55234560 [ 2028.131573][T28062] inactive_file 0 [ 2028.131573][T28062] active_file 0 [ 2028.131573][T28062] unevictable 0 [ 2028.131573][T28062] slab_reclaimable 5271552 [ 2028.131573][T28062] slab_unreclaimable 9310208 [ 2028.131573][T28062] pgfault 1184271 [ 2028.131573][T28062] pgmajfault 0 [ 2028.131573][T28062] workingset_refault 0 [ 2028.131573][T28062] workingset_activate 0 [ 2028.131573][T28062] workingset_nodereclaim 0 [ 2028.131573][T28062] pgrefill 63 [ 2028.131573][T28062] pgscan 36232 [ 2028.131573][T28062] pgsteal 36223 [ 2028.131573][T28062] pgactivate 0 [ 2028.227942][T28062] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=1396,uid=0 [ 2028.243736][T28062] Memory cgroup out of memory: Killed process 1396 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2028.267069][T28062] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2028.278911][T28062] CPU: 1 PID: 28062 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #86 [ 2028.286859][T28062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2028.296887][T28062] Call Trace: [ 2028.300160][T28062] dump_stack+0x1d8/0x2f8 [ 2028.304485][T28062] dump_header+0xd8/0x960 [ 2028.308800][T28062] oom_kill_process+0xcd/0x350 [ 2028.313549][T28062] out_of_memory+0x5c8/0x880 [ 2028.318120][T28062] try_charge+0x125a/0x1910 [ 2028.322607][T28062] __memcg_kmem_charge+0x146/0x500 [ 2028.327697][T28062] __alloc_pages_nodemask+0x29a/0x5d0 [ 2028.333065][T28062] copy_process+0x57e/0x5ac0 [ 2028.337632][T28062] ? __kasan_check_write+0x14/0x20 [ 2028.342724][T28062] ? __might_fault+0xf9/0x160 [ 2028.347389][T28062] _do_fork+0x13f/0x5b0 [ 2028.351528][T28062] ? debug_smp_processor_id+0x1c/0x20 [ 2028.356888][T28062] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 2028.362940][T28062] __x64_sys_clone+0x1ec/0x230 [ 2028.367701][T28062] do_syscall_64+0xfe/0x140 [ 2028.372184][T28062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2028.378078][T28062] RIP: 0033:0x457dfa [ 2028.381959][T28062] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2028.401795][T28062] RSP: 002b:00007ffd1398a7b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2028.410183][T28062] RAX: ffffffffffffffda RBX: 00007ffd1398a7b0 RCX: 0000000000457dfa [ 2028.418134][T28062] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2028.426088][T28062] RBP: 00007ffd1398a7f0 R08: 0000000000000001 R09: 0000555555c3b940 [ 2028.434043][T28062] R10: 0000555555c3bc10 R11: 0000000000000246 R12: 0000000000000001 [ 2028.442089][T28062] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd1398a840 [ 2028.451066][T28062] memory: usage 69860kB, limit 0kB, failcnt 2665 [ 2028.457376][T28062] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2028.464378][T28062] Memory cgroup stats for /syz3: [ 2028.464437][T28062] anon 53030912 [ 2028.464437][T28062] file 147456 [ 2028.464437][T28062] kernel_stack 851968 [ 2028.464437][T28062] slab 14446592 [ 2028.464437][T28062] sock 0 [ 2028.464437][T28062] shmem 0 [ 2028.464437][T28062] file_mapped 0 [ 2028.464437][T28062] file_dirty 0 [ 2028.464437][T28062] file_writeback 0 [ 2028.464437][T28062] anon_thp 50331648 [ 2028.464437][T28062] inactive_anon 57344 [ 2028.464437][T28062] active_anon 53030912 [ 2028.464437][T28062] inactive_file 0 [ 2028.464437][T28062] active_file 0 [ 2028.464437][T28062] unevictable 0 [ 2028.464437][T28062] slab_reclaimable 5271552 [ 2028.464437][T28062] slab_unreclaimable 9175040 [ 2028.464437][T28062] pgfault 1184271 [ 2028.464437][T28062] pgmajfault 0 [ 2028.464437][T28062] workingset_refault 0 [ 2028.464437][T28062] workingset_activate 0 [ 2028.464437][T28062] workingset_nodereclaim 0 [ 2028.464437][T28062] pgrefill 63 [ 2028.464437][T28062] pgscan 36232 [ 2028.464437][T28062] pgsteal 36223 [ 2028.464437][T28062] pgactivate 0 [ 2028.560760][T28062] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=1277,uid=0 [ 2028.576719][T28062] Memory cgroup out of memory: Killed process 1277 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2028.599802][T28062] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2028.611655][T28062] CPU: 1 PID: 28062 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #86 [ 2028.619613][T28062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2028.629661][T28062] Call Trace: [ 2028.632932][T28062] dump_stack+0x1d8/0x2f8 [ 2028.637256][T28062] dump_header+0xd8/0x960 [ 2028.641564][T28062] oom_kill_process+0xcd/0x350 [ 2028.646307][T28062] out_of_memory+0x5c8/0x880 [ 2028.650893][T28062] try_charge+0x125a/0x1910 [ 2028.655398][T28062] __memcg_kmem_charge+0x146/0x500 [ 2028.660487][T28062] __alloc_pages_nodemask+0x29a/0x5d0 [ 2028.665849][T28062] copy_process+0x57e/0x5ac0 [ 2028.670431][T28062] ? __kasan_check_write+0x14/0x20 [ 2028.675533][T28062] ? __might_fault+0xf9/0x160 [ 2028.680191][T28062] _do_fork+0x13f/0x5b0 [ 2028.684335][T28062] ? debug_smp_processor_id+0x1c/0x20 [ 2028.689680][T28062] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 2028.695721][T28062] __x64_sys_clone+0x1ec/0x230 [ 2028.700485][T28062] do_syscall_64+0xfe/0x140 [ 2028.704972][T28062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2028.710846][T28062] RIP: 0033:0x457dfa [ 2028.714731][T28062] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2028.734314][T28062] RSP: 002b:00007ffd1398a7b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2028.742697][T28062] RAX: ffffffffffffffda RBX: 00007ffd1398a7b0 RCX: 0000000000457dfa [ 2028.750645][T28062] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2028.758606][T28062] RBP: 00007ffd1398a7f0 R08: 0000000000000001 R09: 0000555555c3b940 [ 2028.766574][T28062] R10: 0000555555c3bc10 R11: 0000000000000246 R12: 0000000000000001 [ 2028.774522][T28062] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd1398a840 [ 2028.783315][T28062] memory: usage 67544kB, limit 0kB, failcnt 2671 [ 2028.789725][T28062] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2028.796542][T28062] Memory cgroup stats for /syz3: [ 2028.796602][T28062] anon 50827264 [ 2028.796602][T28062] file 147456 [ 2028.796602][T28062] kernel_stack 786432 [ 2028.796602][T28062] slab 14446592 [ 2028.796602][T28062] sock 0 [ 2028.796602][T28062] shmem 0 [ 2028.796602][T28062] file_mapped 0 [ 2028.796602][T28062] file_dirty 0 [ 2028.796602][T28062] file_writeback 0 [ 2028.796602][T28062] anon_thp 48234496 [ 2028.796602][T28062] inactive_anon 57344 [ 2028.796602][T28062] active_anon 50827264 [ 2028.796602][T28062] inactive_file 0 [ 2028.796602][T28062] active_file 0 [ 2028.796602][T28062] unevictable 0 [ 2028.796602][T28062] slab_reclaimable 5271552 [ 2028.796602][T28062] slab_unreclaimable 9175040 [ 2028.796602][T28062] pgfault 1184271 [ 2028.796602][T28062] pgmajfault 0 [ 2028.796602][T28062] workingset_refault 0 [ 2028.796602][T28062] workingset_activate 0 [ 2028.796602][T28062] workingset_nodereclaim 0 [ 2028.796602][T28062] pgrefill 63 [ 2028.796602][T28062] pgscan 36232 [ 2028.796602][T28062] pgsteal 36223 [ 2028.796602][T28062] pgactivate 0 [ 2028.892893][T28062] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=1259,uid=0 [ 2028.908360][T28062] Memory cgroup out of memory: Killed process 1259 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2028.931471][T28062] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2028.943300][T28062] CPU: 1 PID: 28062 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #86 [ 2028.951254][T28062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2028.961286][T28062] Call Trace: [ 2028.964554][T28062] dump_stack+0x1d8/0x2f8 [ 2028.968860][T28062] dump_header+0xd8/0x960 [ 2028.973170][T28062] oom_kill_process+0xcd/0x350 [ 2028.977919][T28062] out_of_memory+0x5c8/0x880 [ 2028.982485][T28062] try_charge+0x125a/0x1910 [ 2028.986979][T28062] __memcg_kmem_charge+0x146/0x500 [ 2028.992075][T28062] __alloc_pages_nodemask+0x29a/0x5d0 [ 2028.997440][T28062] copy_process+0x57e/0x5ac0 [ 2029.002036][T28062] ? __kasan_check_write+0x14/0x20 [ 2029.007130][T28062] ? __might_fault+0xf9/0x160 [ 2029.011787][T28062] _do_fork+0x13f/0x5b0 [ 2029.015919][T28062] ? debug_smp_processor_id+0x1c/0x20 [ 2029.021269][T28062] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 2029.027313][T28062] __x64_sys_clone+0x1ec/0x230 [ 2029.032055][T28062] do_syscall_64+0xfe/0x140 [ 2029.036542][T28062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2029.042430][T28062] RIP: 0033:0x457dfa [ 2029.046298][T28062] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2029.065885][T28062] RSP: 002b:00007ffd1398a7b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2029.074268][T28062] RAX: ffffffffffffffda RBX: 00007ffd1398a7b0 RCX: 0000000000457dfa [ 2029.082224][T28062] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2029.090175][T28062] RBP: 00007ffd1398a7f0 R08: 0000000000000001 R09: 0000555555c3b940 [ 2029.098128][T28062] R10: 0000555555c3bc10 R11: 0000000000000246 R12: 0000000000000001 [ 2029.106074][T28062] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd1398a840 [ 2029.115048][T28062] memory: usage 65228kB, limit 0kB, failcnt 2677 [ 2029.121385][T28062] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2029.128303][T28062] Memory cgroup stats for /syz3: [ 2029.128362][T28062] anon 48623616 [ 2029.128362][T28062] file 147456 [ 2029.128362][T28062] kernel_stack 786432 [ 2029.128362][T28062] slab 14446592 [ 2029.128362][T28062] sock 0 [ 2029.128362][T28062] shmem 0 [ 2029.128362][T28062] file_mapped 0 [ 2029.128362][T28062] file_dirty 0 [ 2029.128362][T28062] file_writeback 0 [ 2029.128362][T28062] anon_thp 46137344 [ 2029.128362][T28062] inactive_anon 57344 [ 2029.128362][T28062] active_anon 48623616 [ 2029.128362][T28062] inactive_file 0 [ 2029.128362][T28062] active_file 0 [ 2029.128362][T28062] unevictable 0 [ 2029.128362][T28062] slab_reclaimable 5271552 [ 2029.128362][T28062] slab_unreclaimable 9175040 [ 2029.128362][T28062] pgfault 1184271 [ 2029.128362][T28062] pgmajfault 0 [ 2029.128362][T28062] workingset_refault 0 [ 2029.128362][T28062] workingset_activate 0 [ 2029.128362][T28062] workingset_nodereclaim 0 [ 2029.128362][T28062] pgrefill 63 [ 2029.128362][T28062] pgscan 36232 [ 2029.128362][T28062] pgsteal 36223 [ 2029.128362][T28062] pgactivate 0 [ 2029.224714][T28062] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=1145,uid=0 [ 2029.240438][T28062] Memory cgroup out of memory: Killed process 1145 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.263262][T28062] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2029.275182][T28062] CPU: 1 PID: 28062 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #86 [ 2029.283161][T28062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2029.293215][T28062] Call Trace: [ 2029.296477][T28062] dump_stack+0x1d8/0x2f8 [ 2029.300786][T28062] dump_header+0xd8/0x960 [ 2029.305092][T28062] oom_kill_process+0xcd/0x350 [ 2029.309845][T28062] out_of_memory+0x5c8/0x880 [ 2029.314417][T28062] try_charge+0x125a/0x1910 [ 2029.318906][T28062] __memcg_kmem_charge+0x146/0x500 [ 2029.324021][T28062] __alloc_pages_nodemask+0x29a/0x5d0 [ 2029.329371][T28062] copy_process+0x57e/0x5ac0 [ 2029.333936][T28062] ? __kasan_check_write+0x14/0x20 [ 2029.339033][T28062] ? __might_fault+0xf9/0x160 [ 2029.343701][T28062] _do_fork+0x13f/0x5b0 [ 2029.347857][T28062] ? debug_smp_processor_id+0x1c/0x20 [ 2029.353206][T28062] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 2029.359247][T28062] __x64_sys_clone+0x1ec/0x230 [ 2029.363992][T28062] do_syscall_64+0xfe/0x140 [ 2029.368470][T28062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2029.374344][T28062] RIP: 0033:0x457dfa [ 2029.378213][T28062] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2029.397788][T28062] RSP: 002b:00007ffd1398a7b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2029.406183][T28062] RAX: ffffffffffffffda RBX: 00007ffd1398a7b0 RCX: 0000000000457dfa [ 2029.414131][T28062] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2029.422076][T28062] RBP: 00007ffd1398a7f0 R08: 0000000000000001 R09: 0000555555c3b940 [ 2029.430059][T28062] R10: 0000555555c3bc10 R11: 0000000000000246 R12: 0000000000000001 [ 2029.438010][T28062] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd1398a840 [ 2029.447856][T28062] memory: usage 62888kB, limit 0kB, failcnt 2683 [ 2029.454219][T28062] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2029.461213][T28062] Memory cgroup stats for /syz3: [ 2029.461272][T28062] anon 46419968 [ 2029.461272][T28062] file 147456 [ 2029.461272][T28062] kernel_stack 720896 [ 2029.461272][T28062] slab 14446592 [ 2029.461272][T28062] sock 0 [ 2029.461272][T28062] shmem 0 [ 2029.461272][T28062] file_mapped 0 [ 2029.461272][T28062] file_dirty 0 [ 2029.461272][T28062] file_writeback 0 [ 2029.461272][T28062] anon_thp 44040192 [ 2029.461272][T28062] inactive_anon 57344 [ 2029.461272][T28062] active_anon 46419968 [ 2029.461272][T28062] inactive_file 0 [ 2029.461272][T28062] active_file 0 [ 2029.461272][T28062] unevictable 0 [ 2029.461272][T28062] slab_reclaimable 5271552 [ 2029.461272][T28062] slab_unreclaimable 9175040 [ 2029.461272][T28062] pgfault 1184271 [ 2029.461272][T28062] pgmajfault 0 [ 2029.461272][T28062] workingset_refault 0 [ 2029.461272][T28062] workingset_activate 0 [ 2029.461272][T28062] workingset_nodereclaim 0 [ 2029.461272][T28062] pgrefill 63 [ 2029.461272][T28062] pgscan 36232 [ 2029.461272][T28062] pgsteal 36223 [ 2029.461272][T28062] pgactivate 0 [ 2029.557679][T28062] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=1020,uid=0 [ 2029.573426][T28062] Memory cgroup out of memory: Killed process 1020 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.596532][T28062] Memory cgroup out of memory: Killed process 931 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.619176][T28062] Memory cgroup out of memory: Killed process 896 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.641697][T28062] Memory cgroup out of memory: Killed process 774 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.664238][T28062] Memory cgroup out of memory: Killed process 658 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.686821][T28062] Memory cgroup out of memory: Killed process 603 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.709992][T28062] Memory cgroup out of memory: Killed process 539 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.732752][T28062] Memory cgroup out of memory: Killed process 484 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.755570][T28062] Memory cgroup out of memory: Killed process 413 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.778404][T28062] Memory cgroup out of memory: Killed process 385 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.801111][T28062] Memory cgroup out of memory: Killed process 32758 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.823949][T28062] Memory cgroup out of memory: Killed process 32754 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.847042][T28062] Memory cgroup out of memory: Killed process 32636 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.870060][T28062] Memory cgroup out of memory: Killed process 32525 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.893185][T28062] Memory cgroup out of memory: Killed process 32514 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.907767][ T1057] oom_reaper: reaped process 32514 (syz-executor.3), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 2029.920391][T28062] Memory cgroup out of memory: Killed process 32400 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.943126][T28062] Memory cgroup out of memory: Killed process 32285 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.968257][T28062] Memory cgroup out of memory: Killed process 32162 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2029.984786][ T1057] oom_reaper: reaped process 32162 (syz-executor.3), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 2029.997313][T28062] Memory cgroup out of memory: Killed process 32060 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2030.022097][T28062] Memory cgroup out of memory: Killed process 31982 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2030.046946][T28062] Memory cgroup out of memory: Killed process 31881 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:34816kB, shmem-rss:0kB [ 2030.072055][T28062] Memory cgroup out of memory: Killed process 28062 (syz-executor.3) total-vm:72444kB, anon-rss:104kB, file-rss:35776kB, shmem-rss:0kB [ 2030.088350][ T1057] oom_reaper: reaped process 28062 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 01:07:41 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x408200, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r3, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) r7 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x5, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r6, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={r8, 0x1000, 0x8}, 0xc) r9 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0x2, 0x200000001, 0x84) sendmsg$kcm(r10, &(0x7f0000000340)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000080)='\'', 0x1}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x1000, 0x0, 0x6, 0x0, 0xb7, 0x80, 0x20af8f73f23954e6, 0x7, 0x0, 0x9, 0x8, 0x8, 0x5, 0x1f, 0x400, 0x0, 0x3, 0x0, 0x4, 0x7fffffff, 0x8, 0xfffffffffffffffa, 0x6, 0x3115, 0x2, 0x7000, 0x80, 0x9, 0x3c7, 0x0, 0x3, 0x6, 0x4, 0x800, 0xfffffffffffffffc, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000540), 0xb}, 0x202, 0xd30e, 0x8, 0x7, 0x9, 0x5, 0x10001}, r7, 0x0, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000380)=""/124, 0x7c}, {&(0x7f0000000440)=""/194, 0xc2}], 0x2, &(0x7f0000000200)=""/60, 0x3c}, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r9) write$cgroup_int(r4, 0x0, 0x0) 01:07:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000000702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x60110000000000}, 0x48) 01:07:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2000000}}, 0x48) 01:07:41 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cf000000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xe8010000]}, 0x48) 01:07:41 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x80ffffff]}, 0x48) 01:07:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x60120000000000}, 0x48) 01:07:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3000000}}, 0x48) 01:07:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xf0030000]}, 0x48) 01:07:42 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x60130000000000}, 0x48) 01:07:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x408200, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r3, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) r7 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x5, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r6, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={r8, 0x1000, 0x8}, 0xc) r9 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0x2, 0x200000001, 0x84) sendmsg$kcm(r10, &(0x7f0000000340)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000080)='\'', 0x1}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x1000, 0x0, 0x6, 0x0, 0xb7, 0x80, 0x20af8f73f23954e6, 0x7, 0x0, 0x9, 0x8, 0x8, 0x5, 0x1f, 0x400, 0x0, 0x3, 0x0, 0x4, 0x7fffffff, 0x8, 0xfffffffffffffffa, 0x6, 0x3115, 0x2, 0x7000, 0x80, 0x9, 0x3c7, 0x0, 0x3, 0x6, 0x4, 0x800, 0xfffffffffffffffc, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000540), 0xb}, 0x202, 0xd30e, 0x8, 0x7, 0x9, 0x5, 0x10001}, r7, 0x0, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000380)=""/124, 0x7c}, {&(0x7f0000000440)=""/194, 0xc2}], 0x2, &(0x7f0000000200)=""/60, 0x3c}, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r9) write$cgroup_int(r4, 0x0, 0x0) 01:07:42 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x90ffffff]}, 0x48) 01:07:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4000000}}, 0x48) 01:07:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xfc030000]}, 0x48) 01:07:42 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x60140000000000}, 0x48) 01:07:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x48) 01:07:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cfa00000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x5000000}}, 0x48) 01:07:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x60150000000000}, 0x48) 01:07:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xff5fff5f]}, 0x48) 01:07:42 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:42 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff]}, 0x48) [ 2031.321663][ T66] device bridge_slave_1 left promiscuous mode [ 2031.327909][ T66] bridge0: port 2(bridge_slave_1) entered disabled state [ 2031.335817][ T66] device bridge_slave_0 left promiscuous mode [ 2031.344137][ T66] bridge0: port 1(bridge_slave_0) entered disabled state [ 2032.334212][ T66] device hsr_slave_0 left promiscuous mode [ 2032.340537][ T66] device hsr_slave_1 left promiscuous mode [ 2032.355375][ T66] team0 (unregistering): Port device team_slave_1 removed [ 2032.365794][ T66] team0 (unregistering): Port device team_slave_0 removed [ 2032.378533][ T66] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2032.393908][ T66] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2032.428348][ T66] bond0 (unregistering): Released all slaves [ 2032.497586][T29122] IPVS: ftp: loaded support on port[0] = 21 [ 2032.577138][T29122] chnl_net:caif_netlink_parms(): no params data found [ 2032.634080][T29122] bridge0: port 1(bridge_slave_0) entered blocking state [ 2032.651226][T29122] bridge0: port 1(bridge_slave_0) entered disabled state [ 2032.669352][T29122] device bridge_slave_0 entered promiscuous mode [ 2032.679743][T29122] bridge0: port 2(bridge_slave_1) entered blocking state [ 2032.686756][T29122] bridge0: port 2(bridge_slave_1) entered disabled state [ 2032.709943][T29122] device bridge_slave_1 entered promiscuous mode [ 2032.744109][T29122] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2032.782322][T29122] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2032.812273][T29122] team0: Port device team_slave_0 added [ 2032.818735][T29122] team0: Port device team_slave_1 added [ 2032.847706][T29122] device hsr_slave_0 entered promiscuous mode [ 2032.869642][T29122] device hsr_slave_1 entered promiscuous mode [ 2032.875805][T29122] debugfs: Directory 'hsr0' with parent '/' already present! [ 2032.912476][T29122] bridge0: port 2(bridge_slave_1) entered blocking state [ 2032.919553][T29122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2032.926828][T29122] bridge0: port 1(bridge_slave_0) entered blocking state [ 2032.933868][T29122] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2033.025722][T29122] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2033.045891][T32645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2033.062178][T32645] bridge0: port 1(bridge_slave_0) entered disabled state [ 2033.081631][T32645] bridge0: port 2(bridge_slave_1) entered disabled state [ 2033.103214][T29122] 8021q: adding VLAN 0 to HW filter on device team0 [ 2033.112561][T32645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2033.129809][T32645] bridge0: port 1(bridge_slave_0) entered blocking state [ 2033.136855][T32645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2033.170266][T32645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2033.187451][T32645] bridge0: port 2(bridge_slave_1) entered blocking state [ 2033.194502][T32645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2033.205087][T32645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2033.213860][T32645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2033.227608][T29122] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2033.238453][T29122] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2033.252817][ T5303] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2033.261243][ T5303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2033.271381][ T5303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2033.288081][T29122] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2033.298176][T19896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2033.444584][T29129] oom_kill_process: 21 callbacks suppressed [ 2033.444606][T29129] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2033.461221][T29129] CPU: 1 PID: 29129 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #86 [ 2033.469179][T29129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2033.479216][T29129] Call Trace: [ 2033.482494][T29129] dump_stack+0x1d8/0x2f8 [ 2033.486836][T29129] dump_header+0xd8/0x960 [ 2033.491146][T29129] oom_kill_process+0xcd/0x350 [ 2033.495892][T29129] out_of_memory+0x5c8/0x880 [ 2033.500466][T29129] memory_max_write+0x4ba/0x600 [ 2033.505301][T29129] ? memory_max_show+0xa0/0xa0 [ 2033.510047][T29129] cgroup_file_write+0x223/0x5f0 [ 2033.514969][T29129] ? cgroup_seqfile_stop+0xc0/0xc0 [ 2033.520086][T29129] kernfs_fop_write+0x3e4/0x4f0 [ 2033.524931][T29129] ? kernfs_fop_read+0x580/0x580 [ 2033.529854][T29129] __vfs_write+0xb8/0x740 [ 2033.534174][T29129] ? check_preemption_disabled+0x47/0x2a0 [ 2033.539881][T29129] ? __sb_start_write+0x403/0x4c0 [ 2033.544885][T29129] vfs_write+0x275/0x590 [ 2033.549111][T29129] ksys_write+0x117/0x220 [ 2033.553422][T29129] __x64_sys_write+0x7b/0x90 [ 2033.557990][T29129] do_syscall_64+0xfe/0x140 [ 2033.562503][T29129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2033.568898][T29129] RIP: 0033:0x459829 [ 2033.572781][T29129] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2033.592449][T29129] RSP: 002b:00007efcf8b5bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2033.600833][T29129] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 2033.608780][T29129] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 2033.616734][T29129] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2033.624689][T29129] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efcf8b5c6d4 [ 2033.632644][T29129] R13: 00000000004c99a3 R14: 00000000004e1028 R15: 00000000ffffffff [ 2033.642041][T29129] memory: usage 17504kB, limit 0kB, failcnt 2812 [ 2033.648472][T29129] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2033.655600][T29129] Memory cgroup stats for /syz3: [ 2033.657013][T29129] anon 4308992 [ 2033.657013][T29129] file 147456 [ 2033.657013][T29129] kernel_stack 65536 [ 2033.657013][T29129] slab 13615104 [ 2033.657013][T29129] sock 0 [ 2033.657013][T29129] shmem 0 [ 2033.657013][T29129] file_mapped 0 [ 2033.657013][T29129] file_dirty 0 [ 2033.657013][T29129] file_writeback 0 [ 2033.657013][T29129] anon_thp 4194304 [ 2033.657013][T29129] inactive_anon 57344 [ 2033.657013][T29129] active_anon 4308992 [ 2033.657013][T29129] inactive_file 0 [ 2033.657013][T29129] active_file 0 [ 2033.657013][T29129] unevictable 0 [ 2033.657013][T29129] slab_reclaimable 5136384 [ 2033.657013][T29129] slab_unreclaimable 8478720 [ 2033.657013][T29129] pgfault 1184304 [ 2033.657013][T29129] pgmajfault 0 [ 2033.657013][T29129] workingset_refault 0 [ 2033.657013][T29129] workingset_activate 0 [ 2033.657013][T29129] workingset_nodereclaim 0 [ 2033.657013][T29129] pgrefill 63 [ 2033.657013][T29129] pgscan 36232 [ 2033.657013][T29129] pgsteal 36223 [ 2033.657013][T29129] pgactivate 0 [ 2033.753220][T29129] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=29128,uid=0 [ 2033.769053][T29129] Memory cgroup out of memory: Killed process 29128 (syz-executor.3) total-vm:72580kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 2033.787512][ T1057] oom_reaper: reaped process 29128 (syz-executor.3), now anon-rss:0kB, file-rss:34860kB, shmem-rss:0kB 01:07:45 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x408200, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r3, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) r7 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x5, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r6, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={r8, 0x1000, 0x8}, 0xc) r9 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0x2, 0x200000001, 0x84) sendmsg$kcm(r10, &(0x7f0000000340)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000080)='\'', 0x1}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x1000, 0x0, 0x6, 0x0, 0xb7, 0x80, 0x20af8f73f23954e6, 0x7, 0x0, 0x9, 0x8, 0x8, 0x5, 0x1f, 0x400, 0x0, 0x3, 0x0, 0x4, 0x7fffffff, 0x8, 0xfffffffffffffffa, 0x6, 0x3115, 0x2, 0x7000, 0x80, 0x9, 0x3c7, 0x0, 0x3, 0x6, 0x4, 0x800, 0xfffffffffffffffc, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000540), 0xb}, 0x202, 0xd30e, 0x8, 0x7, 0x9, 0x5, 0x10001}, r7, 0x0, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000380)=""/124, 0x7c}, {&(0x7f0000000440)=""/194, 0xc2}], 0x2, &(0x7f0000000200)=""/60, 0x3c}, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r9) write$cgroup_int(r4, 0x0, 0x0) 01:07:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6000000}}, 0x48) 01:07:45 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:07:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x60160000000000}, 0x48) 01:07:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xff9f0000]}, 0x48) 01:07:45 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0xc0ffffff]}, 0x48) [ 2034.072841][T29122] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2034.084245][T29122] CPU: 1 PID: 29122 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #86 [ 2034.092215][T29122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2034.102248][T29122] Call Trace: [ 2034.105531][T29122] dump_stack+0x1d8/0x2f8 [ 2034.109836][T29122] dump_header+0xd8/0x960 [ 2034.114146][T29122] oom_kill_process+0xcd/0x350 [ 2034.118882][T29122] out_of_memory+0x5c8/0x880 [ 2034.123450][T29122] try_charge+0x125a/0x1910 [ 2034.127937][T29122] mem_cgroup_try_charge+0x20c/0x680 [ 2034.133195][T29122] mem_cgroup_try_charge_delay+0x25/0xa0 [ 2034.138803][T29122] wp_page_copy+0x356/0x1980 [ 2034.143363][T29122] ? trace_lock_release+0x135/0x1a0 [ 2034.148537][T29122] ? do_wp_page+0x27f/0x1cc0 [ 2034.153122][T29122] ? __kasan_check_read+0x11/0x20 [ 2034.158119][T29122] ? do_raw_spin_unlock+0x49/0x260 [ 2034.163204][T29122] do_wp_page+0x5e5/0x1cc0 [ 2034.167595][T29122] ? __kasan_check_write+0x14/0x20 [ 2034.172688][T29122] handle_mm_fault+0x2adc/0x6010 [ 2034.177608][T29122] do_user_addr_fault+0x589/0xaf0 [ 2034.182607][T29122] __do_page_fault+0xd3/0x1f0 [ 2034.187258][T29122] do_page_fault+0x99/0xb0 [ 2034.191657][T29122] page_fault+0x39/0x40 [ 2034.195792][T29122] RIP: 0033:0x430906 [ 2034.199695][T29122] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 [ 2034.219269][T29122] RSP: 002b:00007fffecd31680 EFLAGS: 00010206 [ 2034.225308][T29122] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 2034.233256][T29122] RDX: 0000555555e08930 RSI: 0000555555e10970 RDI: 0000000000000003 [ 2034.241199][T29122] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555555e07940 [ 2034.249143][T29122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 2034.257085][T29122] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 2034.265798][T29122] memory: usage 13116kB, limit 0kB, failcnt 2820 [ 2034.281747][T29122] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2034.288664][T29122] Memory cgroup stats for /syz3: [ 2034.288717][T29122] anon 49152 [ 2034.288717][T29122] file 147456 [ 2034.288717][T29122] kernel_stack 65536 [ 2034.288717][T29122] slab 13615104 [ 2034.288717][T29122] sock 0 [ 2034.288717][T29122] shmem 0 [ 2034.288717][T29122] file_mapped 0 [ 2034.288717][T29122] file_dirty 0 [ 2034.288717][T29122] file_writeback 0 [ 2034.288717][T29122] anon_thp 0 [ 2034.288717][T29122] inactive_anon 57344 [ 2034.288717][T29122] active_anon 49152 [ 2034.288717][T29122] inactive_file 0 [ 2034.288717][T29122] active_file 0 [ 2034.288717][T29122] unevictable 0 [ 2034.288717][T29122] slab_reclaimable 5136384 [ 2034.288717][T29122] slab_unreclaimable 8478720 [ 2034.288717][T29122] pgfault 1184337 [ 2034.288717][T29122] pgmajfault 0 [ 2034.288717][T29122] workingset_refault 0 [ 2034.288717][T29122] workingset_activate 0 [ 2034.288717][T29122] workingset_nodereclaim 0 [ 2034.288717][T29122] pgrefill 63 [ 2034.288717][T29122] pgscan 36232 [ 2034.288717][T29122] pgsteal 36223 01:07:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cfa00000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x7000000}}, 0x48) 01:07:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffff8000]}, 0x48) 01:07:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x601c0000000000}, 0x48) [ 2034.288717][T29122] pgactivate 0 01:07:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8000000}}, 0x48) 01:07:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000005402000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff7d640200000000006502030004be01000404000001007d60b7030000001000006a0a00fe00000000850000002b000000cfa00000000000009500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2edfa38ccb15f1cb24421d394fcf860db509000000de2243533ef6d62a46b3009a54f4fd7db0d4968a384b0f59c7919b10a43b0958acbdd1e423899d5fdb68832e986440ff0a7edfa0cb231ccdefb8e162969681062c0b55383ddfbc3852a503ec82c5bce547df76f9bd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x9000000}}, 0x48) [ 2034.487824][T29122] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=29122,uid=0 [ 2034.504516][T24424] WARNING: CPU: 1 PID: 24424 at kernel/bpf/core.c:851 bpf_jit_free+0x1a8/0x1f0 [ 2034.513439][T24424] Kernel panic - not syncing: panic_on_warn set ... [ 2034.520009][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2034.520031][ T3907] kobject: 'loop1' (000000000c7a633b): kobject_uevent_env [ 2034.527693][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2034.527703][T24424] Workqueue: events bpf_prog_free_deferred [ 2034.527707][T24424] Call Trace: [ 2034.527720][T24424] dump_stack+0x1d8/0x2f8 [ 2034.535483][T29122] Memory cgroup out of memory: Killed process 29122 (syz-executor.3) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 2034.544813][T24424] panic+0x25c/0x799 [ 2034.544821][T24424] ? __warn+0x126/0x230 [ 2034.544830][T24424] __warn+0x22f/0x230 [ 2034.544836][T24424] ? bpf_jit_free+0x1a8/0x1f0 [ 2034.544845][T24424] report_bug+0x190/0x290 [ 2034.552035][ T3907] kobject: 'loop1' (000000000c7a633b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2034.553882][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2034.610970][T24424] #PF: supervisor read access in kernel mode [ 2034.616916][T24424] #PF: error_code(0x0000) - not-present page [ 2034.622854][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2034.630398][T24424] Oops: 0000 [#1] PREEMPT SMP KASAN [ 2034.635560][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2034.643235][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2034.653257][T24424] Workqueue: events bpf_prog_free_deferred [ 2034.659037][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2034.664891][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2034.684459][T24424] RSP: 0018:ffff888068127828 EFLAGS: 00010806 [ 2034.690490][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2034.698427][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2034.706364][T24424] RBP: ffff888068127860 R08: ffffffff817dc33b R09: 0000000000000001 [ 2034.714302][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2034.722241][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2034.730177][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2034.739071][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2034.745619][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2034.753557][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2034.761501][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2034.769454][T24424] Call Trace: [ 2034.772738][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2034.780418][T24424] #PF: supervisor read access in kernel mode [ 2034.786364][T24424] #PF: error_code(0x0000) - not-present page [ 2034.792312][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2034.799819][T24424] Oops: 0000 [#2] PREEMPT SMP KASAN [ 2034.804980][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2034.812665][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2034.822694][T24424] Workqueue: events bpf_prog_free_deferred [ 2034.828471][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2034.834347][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2034.853912][T24424] RSP: 0018:ffff888068127450 EFLAGS: 00010806 [ 2034.859973][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2034.867912][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2034.875846][T24424] RBP: ffff888068127488 R08: ffffffff817dc33b R09: 0000000000000001 [ 2034.883893][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2034.891829][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2034.899767][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2034.908669][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2034.915232][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2034.923192][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2034.931128][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2034.939070][T24424] Call Trace: [ 2034.942334][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2034.950017][T24424] #PF: supervisor read access in kernel mode [ 2034.955970][T24424] #PF: error_code(0x0000) - not-present page [ 2034.961909][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2034.969420][T24424] Oops: 0000 [#3] PREEMPT SMP KASAN [ 2034.974588][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2034.982262][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2034.992292][T24424] Workqueue: events bpf_prog_free_deferred [ 2034.998073][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2035.003946][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2035.023512][T24424] RSP: 0018:ffff888068127080 EFLAGS: 00010806 [ 2035.029542][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2035.037493][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2035.045429][T24424] RBP: ffff8880681270b8 R08: ffffffff817dc33b R09: 0000000000000001 [ 2035.053367][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2035.061303][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2035.069237][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2035.078135][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2035.084703][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2035.092648][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2035.100586][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2035.108532][T24424] Call Trace: [ 2035.111801][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2035.119484][T24424] #PF: supervisor read access in kernel mode [ 2035.125427][T24424] #PF: error_code(0x0000) - not-present page [ 2035.131464][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2035.138971][T24424] Oops: 0000 [#4] PREEMPT SMP KASAN [ 2035.144156][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2035.151834][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2035.161854][T24424] Workqueue: events bpf_prog_free_deferred [ 2035.167629][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2035.173482][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2035.193052][T24424] RSP: 0018:ffff888068126cb0 EFLAGS: 00010806 [ 2035.199087][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2035.207023][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2035.214977][T24424] RBP: ffff888068126ce8 R08: ffffffff817dc33b R09: 0000000000000001 [ 2035.222913][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2035.230851][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2035.238787][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2035.247688][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2035.254235][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2035.262175][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2035.270116][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2035.278050][T24424] Call Trace: [ 2035.281311][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2035.288988][T24424] #PF: supervisor read access in kernel mode [ 2035.294928][T24424] #PF: error_code(0x0000) - not-present page [ 2035.300874][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2035.308386][T24424] Oops: 0000 [#5] PREEMPT SMP KASAN [ 2035.313566][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2035.321240][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2035.331260][T24424] Workqueue: events bpf_prog_free_deferred [ 2035.337030][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2035.342884][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2035.362449][T24424] RSP: 0018:ffff8880681268e0 EFLAGS: 00010806 [ 2035.368490][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2035.376427][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2035.384365][T24424] RBP: ffff888068126918 R08: ffffffff817dc33b R09: 0000000000000001 [ 2035.392304][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2035.400242][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2035.408180][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2035.417072][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2035.423618][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2035.431559][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2035.439495][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2035.447437][T24424] Call Trace: [ 2035.450730][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2035.458416][T24424] #PF: supervisor read access in kernel mode [ 2035.464360][T24424] #PF: error_code(0x0000) - not-present page [ 2035.470299][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2035.477815][T24424] Oops: 0000 [#6] PREEMPT SMP KASAN [ 2035.482976][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2035.490653][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2035.500682][T24424] Workqueue: events bpf_prog_free_deferred [ 2035.506456][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2035.512319][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2035.531885][T24424] RSP: 0018:ffff888068126510 EFLAGS: 00010806 [ 2035.537914][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2035.545857][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2035.553793][T24424] RBP: ffff888068126548 R08: ffffffff817dc33b R09: 0000000000000001 [ 2035.561747][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2035.569683][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2035.577706][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2035.586686][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2035.593235][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2035.601262][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2035.609198][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2035.617135][T24424] Call Trace: [ 2035.620389][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2035.628064][T24424] #PF: supervisor read access in kernel mode [ 2035.634002][T24424] #PF: error_code(0x0000) - not-present page [ 2035.639940][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2035.647449][T24424] Oops: 0000 [#7] PREEMPT SMP KASAN [ 2035.652611][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2035.660286][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2035.670324][T24424] Workqueue: events bpf_prog_free_deferred [ 2035.676093][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2035.681950][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2035.701631][T24424] RSP: 0018:ffff888068126140 EFLAGS: 00010806 [ 2035.707657][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2035.715595][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2035.723542][T24424] RBP: ffff888068126178 R08: ffffffff817dc33b R09: 0000000000000001 [ 2035.731496][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2035.739460][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2035.747397][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2035.756289][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2035.762836][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2035.770773][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2035.778708][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2035.786662][T24424] Call Trace: [ 2035.789916][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2035.797590][T24424] #PF: supervisor read access in kernel mode [ 2035.803532][T24424] #PF: error_code(0x0000) - not-present page [ 2035.809472][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2035.816987][T24424] Oops: 0000 [#8] PREEMPT SMP KASAN [ 2035.822152][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2035.829828][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2035.839848][T24424] Workqueue: events bpf_prog_free_deferred [ 2035.845626][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2035.851488][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2035.871056][T24424] RSP: 0018:ffff888068125d70 EFLAGS: 00010806 [ 2035.877082][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2035.885027][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2035.892982][T24424] RBP: ffff888068125da8 R08: ffffffff817dc33b R09: 0000000000000001 [ 2035.900919][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2035.908854][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2035.916793][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2035.925683][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2035.932240][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2035.940177][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2035.948123][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2035.956068][T24424] Call Trace: [ 2035.959336][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2035.967015][T24424] #PF: supervisor read access in kernel mode [ 2035.972962][T24424] #PF: error_code(0x0000) - not-present page [ 2035.979014][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2035.986544][T24424] Oops: 0000 [#9] PREEMPT SMP KASAN [ 2035.991705][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2035.999423][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2036.009444][T24424] Workqueue: events bpf_prog_free_deferred [ 2036.015220][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2036.021077][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2036.040681][T24424] RSP: 0018:ffff8880681259a0 EFLAGS: 00010806 [ 2036.046711][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2036.054646][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2036.062612][T24424] RBP: ffff8880681259d8 R08: ffffffff817dc33b R09: 0000000000000001 [ 2036.070547][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2036.078482][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2036.086419][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2036.095311][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2036.101859][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2036.109796][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2036.117735][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2036.125680][T24424] Call Trace: [ 2036.128933][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2036.136608][T24424] #PF: supervisor read access in kernel mode [ 2036.142555][T24424] #PF: error_code(0x0000) - not-present page [ 2036.148494][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2036.156010][T24424] Oops: 0000 [#10] PREEMPT SMP KASAN [ 2036.161256][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2036.168935][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2036.179075][T24424] Workqueue: events bpf_prog_free_deferred [ 2036.184869][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2036.190723][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2036.210302][T24424] RSP: 0018:ffff8880681255d0 EFLAGS: 00010806 [ 2036.216328][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2036.224264][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2036.232200][T24424] RBP: ffff888068125608 R08: ffffffff817dc33b R09: 0000000000000001 [ 2036.240144][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2036.248090][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2036.256027][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2036.264919][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2036.271466][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2036.279405][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2036.287342][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2036.295284][T24424] Call Trace: [ 2036.298546][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2036.306238][T24424] #PF: supervisor read access in kernel mode [ 2036.312177][T24424] #PF: error_code(0x0000) - not-present page [ 2036.318152][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2036.325660][T24424] Oops: 0000 [#11] PREEMPT SMP KASAN [ 2036.330914][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2036.338588][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2036.348608][T24424] Workqueue: events bpf_prog_free_deferred [ 2036.354395][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2036.360259][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2036.379825][T24424] RSP: 0018:ffff888068125200 EFLAGS: 00010806 [ 2036.385868][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2036.393813][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2036.401874][T24424] RBP: ffff888068125238 R08: ffffffff817dc33b R09: 0000000000000001 [ 2036.409811][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2036.417754][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2036.425692][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2036.434583][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2036.441150][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2036.449088][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2036.457033][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2036.464977][T24424] Call Trace: [ 2036.468249][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2036.475924][T24424] #PF: supervisor read access in kernel mode [ 2036.481870][T24424] #PF: error_code(0x0000) - not-present page [ 2036.487809][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2036.495317][T24424] Oops: 0000 [#12] PREEMPT SMP KASAN [ 2036.500565][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2036.508272][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2036.518293][T24424] Workqueue: events bpf_prog_free_deferred [ 2036.524073][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2036.529950][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2036.549516][T24424] RSP: 0018:ffff888068124e30 EFLAGS: 00010806 [ 2036.555565][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2036.563509][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2036.571946][T24424] RBP: ffff888068124e68 R08: ffffffff817dc33b R09: 0000000000000001 [ 2036.579882][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2036.587820][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2036.595757][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2036.604648][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2036.611204][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2036.619140][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2036.627076][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2036.635024][T24424] Call Trace: [ 2036.638299][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2036.645975][T24424] #PF: supervisor read access in kernel mode [ 2036.651930][T24424] #PF: error_code(0x0000) - not-present page [ 2036.657884][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2036.665393][T24424] Oops: 0000 [#13] PREEMPT SMP KASAN [ 2036.670641][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2036.678317][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2036.688339][T24424] Workqueue: events bpf_prog_free_deferred [ 2036.694129][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2036.699992][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2036.719557][T24424] RSP: 0018:ffff888068124a60 EFLAGS: 00010806 [ 2036.725593][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2036.733529][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2036.741463][T24424] RBP: ffff888068124a98 R08: ffffffff817dc33b R09: 0000000000000001 [ 2036.749401][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2036.757344][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2036.765281][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2036.774173][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2036.780721][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2036.788657][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2036.796596][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2036.804531][T24424] Call Trace: [ 2036.807792][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2036.815473][T24424] #PF: supervisor read access in kernel mode [ 2036.821413][T24424] #PF: error_code(0x0000) - not-present page [ 2036.827351][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2036.834869][T24424] Oops: 0000 [#14] PREEMPT SMP KASAN [ 2036.840140][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2036.847819][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2036.857841][T24424] Workqueue: events bpf_prog_free_deferred [ 2036.863612][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2036.869466][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2036.889033][T24424] RSP: 0018:ffff888068124690 EFLAGS: 00010806 [ 2036.895061][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2036.902998][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2036.910942][T24424] RBP: ffff8880681246c8 R08: ffffffff817dc33b R09: 0000000000000001 [ 2036.918878][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2036.926816][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2036.934755][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2036.943646][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2036.950195][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2036.958148][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2036.966102][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2036.974040][T24424] Call Trace: [ 2036.977301][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2036.984985][T24424] #PF: supervisor read access in kernel mode [ 2036.990924][T24424] #PF: error_code(0x0000) - not-present page [ 2036.996869][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2037.004376][T24424] Oops: 0000 [#15] PREEMPT SMP KASAN [ 2037.009622][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2037.017303][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2037.027324][T24424] Workqueue: events bpf_prog_free_deferred [ 2037.033094][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2037.038949][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2037.058516][T24424] RSP: 0018:ffff8880681242c0 EFLAGS: 00010806 [ 2037.064543][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2037.072483][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2037.080425][T24424] RBP: ffff8880681242f8 R08: ffffffff817dc33b R09: 0000000000000001 [ 2037.088367][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2037.096323][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2037.104259][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2037.113161][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2037.119721][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2037.127659][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2037.135594][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2037.143563][T24424] Call Trace: [ 2037.146817][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2037.154520][T24424] #PF: supervisor read access in kernel mode [ 2037.160459][T24424] #PF: error_code(0x0000) - not-present page [ 2037.166407][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2037.173923][T24424] Oops: 0000 [#16] PREEMPT SMP KASAN [ 2037.179172][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2037.186861][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2037.196884][T24424] Workqueue: events bpf_prog_free_deferred [ 2037.202654][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2037.208525][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2037.228100][T24424] RSP: 0018:ffff888068123ef0 EFLAGS: 00010806 [ 2037.234136][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2037.242074][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2037.250010][T24424] RBP: ffff888068123f28 R08: ffffffff817dc33b R09: 0000000000000001 [ 2037.257945][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2037.265889][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2037.273828][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2037.282719][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2037.289266][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2037.297210][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2037.305157][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2037.313100][T24424] Call Trace: [ 2037.316365][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2037.324041][T24424] #PF: supervisor read access in kernel mode [ 2037.329982][T24424] #PF: error_code(0x0000) - not-present page [ 2037.335938][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2037.343446][T24424] Oops: 0000 [#17] PREEMPT SMP KASAN [ 2037.348695][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2037.356379][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2037.366399][T24424] Workqueue: events bpf_prog_free_deferred [ 2037.372169][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2037.378022][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2037.397595][T24424] RSP: 0018:ffff888068123b20 EFLAGS: 00010806 [ 2037.403625][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2037.411562][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2037.419498][T24424] RBP: ffff888068123b58 R08: ffffffff817dc33b R09: 0000000000000001 [ 2037.427433][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2037.435370][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2037.443527][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2037.452417][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2037.458965][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2037.466903][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2037.474866][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2037.482803][T24424] Call Trace: [ 2037.486074][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2037.493752][T24424] #PF: supervisor read access in kernel mode [ 2037.499690][T24424] #PF: error_code(0x0000) - not-present page [ 2037.505636][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2037.513143][T24424] Oops: 0000 [#18] PREEMPT SMP KASAN [ 2037.518389][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2037.526082][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2037.536102][T24424] Workqueue: events bpf_prog_free_deferred [ 2037.541873][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2037.547735][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2037.567314][T24424] RSP: 0018:ffff888068123750 EFLAGS: 00010806 [ 2037.573345][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2037.581280][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2037.589216][T24424] RBP: ffff888068123788 R08: ffffffff817dc33b R09: 0000000000000001 [ 2037.597150][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2037.605094][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2037.613054][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2037.621948][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2037.628495][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2037.636459][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2037.644398][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2037.652341][T24424] Call Trace: [ 2037.655613][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2037.663287][T24424] #PF: supervisor read access in kernel mode [ 2037.669226][T24424] #PF: error_code(0x0000) - not-present page [ 2037.675192][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2037.682700][T24424] Oops: 0000 [#19] PREEMPT SMP KASAN [ 2037.687951][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2037.695625][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2037.705646][T24424] Workqueue: events bpf_prog_free_deferred [ 2037.711415][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2037.717270][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2037.736844][T24424] RSP: 0018:ffff888068123380 EFLAGS: 00010806 [ 2037.742879][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2037.750816][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2037.758767][T24424] RBP: ffff8880681233b8 R08: ffffffff817dc33b R09: 0000000000000001 [ 2037.766701][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2037.774644][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2037.782592][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2037.791491][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2037.798061][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2037.806019][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2037.813969][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2037.821903][T24424] Call Trace: [ 2037.825157][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2037.832835][T24424] #PF: supervisor read access in kernel mode [ 2037.838782][T24424] #PF: error_code(0x0000) - not-present page [ 2037.844721][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2037.852236][T24424] Oops: 0000 [#20] PREEMPT SMP KASAN [ 2037.857491][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2037.865173][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2037.875202][T24424] Workqueue: events bpf_prog_free_deferred [ 2037.881000][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2037.886857][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2037.906422][T24424] RSP: 0018:ffff888068122fb0 EFLAGS: 00010806 [ 2037.912449][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2037.920423][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2037.928368][T24424] RBP: ffff888068122fe8 R08: ffffffff817dc33b R09: 0000000000000001 [ 2037.936334][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2037.944271][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2037.952216][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2037.961120][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2037.967667][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2037.975607][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2037.983552][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2037.991487][T24424] Call Trace: [ 2037.994740][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2038.002452][T24424] #PF: supervisor read access in kernel mode [ 2038.008401][T24424] #PF: error_code(0x0000) - not-present page [ 2038.014359][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2038.021869][T24424] Oops: 0000 [#21] PREEMPT SMP KASAN [ 2038.027116][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2038.034798][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2038.044834][T24424] Workqueue: events bpf_prog_free_deferred [ 2038.050606][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2038.056459][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2038.076023][T24424] RSP: 0018:ffff888068122be0 EFLAGS: 00010806 [ 2038.082052][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2038.089987][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2038.097932][T24424] RBP: ffff888068122c18 R08: ffffffff817dc33b R09: 0000000000000001 [ 2038.105869][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2038.113805][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2038.121744][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2038.130637][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2038.137193][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2038.145138][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2038.153082][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2038.161017][T24424] Call Trace: [ 2038.164279][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2038.171977][T24424] #PF: supervisor read access in kernel mode [ 2038.177926][T24424] #PF: error_code(0x0000) - not-present page [ 2038.183864][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2038.191372][T24424] Oops: 0000 [#22] PREEMPT SMP KASAN [ 2038.196639][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2038.204328][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2038.214349][T24424] Workqueue: events bpf_prog_free_deferred [ 2038.220139][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2038.226001][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2038.245574][T24424] RSP: 0018:ffff888068122810 EFLAGS: 00010806 [ 2038.251606][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2038.259550][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2038.267485][T24424] RBP: ffff888068122848 R08: ffffffff817dc33b R09: 0000000000000001 [ 2038.275419][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2038.283356][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2038.291294][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2038.300193][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2038.306748][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2038.314701][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2038.322659][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2038.330611][T24424] Call Trace: [ 2038.333867][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2038.341568][T24424] #PF: supervisor read access in kernel mode [ 2038.347515][T24424] #PF: error_code(0x0000) - not-present page [ 2038.353466][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2038.360977][T24424] Oops: 0000 [#23] PREEMPT SMP KASAN [ 2038.366232][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2038.373919][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2038.383943][T24424] Workqueue: events bpf_prog_free_deferred [ 2038.389713][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2038.395579][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2038.415336][T24424] RSP: 0018:ffff888068122440 EFLAGS: 00010806 [ 2038.421369][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2038.429307][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2038.437243][T24424] RBP: ffff888068122478 R08: ffffffff817dc33b R09: 0000000000000001 [ 2038.445183][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2038.453120][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2038.461057][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2038.469947][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2038.476510][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2038.484456][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2038.492395][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2038.500339][T24424] Call Trace: [ 2038.503597][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2038.511280][T24424] #PF: supervisor read access in kernel mode [ 2038.517217][T24424] #PF: error_code(0x0000) - not-present page [ 2038.523164][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2038.530671][T24424] Oops: 0000 [#24] PREEMPT SMP KASAN [ 2038.535920][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2038.543608][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2038.553632][T24424] Workqueue: events bpf_prog_free_deferred [ 2038.559401][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2038.565256][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2038.585310][T24424] RSP: 0018:ffff888068122070 EFLAGS: 00010806 [ 2038.591427][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2038.599362][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2038.607301][T24424] RBP: ffff8880681220a8 R08: ffffffff817dc33b R09: 0000000000000001 [ 2038.615236][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2038.623284][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2038.631242][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2038.640136][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2038.646703][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2038.654649][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2038.662587][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2038.670531][T24424] Call Trace: [ 2038.673786][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2038.681463][T24424] #PF: supervisor read access in kernel mode [ 2038.687510][T24424] #PF: error_code(0x0000) - not-present page [ 2038.693448][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2038.700958][T24424] Oops: 0000 [#25] PREEMPT SMP KASAN [ 2038.706206][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2038.713883][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2038.723925][T24424] Workqueue: events bpf_prog_free_deferred [ 2038.729703][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2038.735558][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2038.755123][T24424] RSP: 0018:ffff888068121ca0 EFLAGS: 00010806 [ 2038.761150][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2038.769088][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2038.777034][T24424] RBP: ffff888068121cd8 R08: ffffffff817dc33b R09: 0000000000000001 [ 2038.784968][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2038.792910][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2038.800847][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2038.809738][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2038.816286][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2038.824223][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2038.832185][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2038.840139][T24424] Call Trace: [ 2038.843396][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2038.851070][T24424] #PF: supervisor read access in kernel mode [ 2038.857008][T24424] #PF: error_code(0x0000) - not-present page [ 2038.862948][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2038.870474][T24424] Oops: 0000 [#26] PREEMPT SMP KASAN [ 2038.875720][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2038.883396][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2038.893517][T24424] Workqueue: events bpf_prog_free_deferred [ 2038.899289][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2038.905147][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2038.924713][T24424] RSP: 0018:ffff8880681218d0 EFLAGS: 00010806 [ 2038.930739][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2038.938676][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2038.946613][T24424] RBP: ffff888068121908 R08: ffffffff817dc33b R09: 0000000000000001 [ 2038.954551][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2038.962485][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2038.970422][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2038.979319][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2038.985874][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2038.993814][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2039.001751][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2039.009685][T24424] Call Trace: [ 2039.012947][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2039.020621][T24424] #PF: supervisor read access in kernel mode [ 2039.026560][T24424] #PF: error_code(0x0000) - not-present page [ 2039.032534][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2039.040051][T24424] Oops: 0000 [#27] PREEMPT SMP KASAN [ 2039.045304][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2039.052982][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2039.063020][T24424] Workqueue: events bpf_prog_free_deferred [ 2039.068795][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2039.074650][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2039.094218][T24424] RSP: 0018:ffff888068121500 EFLAGS: 00010806 [ 2039.100246][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2039.108189][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2039.116124][T24424] RBP: ffff888068121538 R08: ffffffff817dc33b R09: 0000000000000001 [ 2039.124060][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2039.131995][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2039.139936][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2039.148830][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2039.155379][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2039.163319][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2039.171284][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2039.179230][T24424] Call Trace: [ 2039.182492][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2039.190167][T24424] #PF: supervisor read access in kernel mode [ 2039.196107][T24424] #PF: error_code(0x0000) - not-present page [ 2039.202062][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2039.209583][T24424] Oops: 0000 [#28] PREEMPT SMP KASAN [ 2039.214840][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2039.222535][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2039.232557][T24424] Workqueue: events bpf_prog_free_deferred [ 2039.238347][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2039.244201][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2039.263768][T24424] RSP: 0018:ffff888068121130 EFLAGS: 00010806 [ 2039.269799][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2039.277742][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2039.285678][T24424] RBP: ffff888068121168 R08: ffffffff817dc33b R09: 0000000000000001 [ 2039.293635][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2039.301577][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2039.309535][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2039.318432][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2039.324986][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2039.332932][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2039.340870][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2039.348812][T24424] Call Trace: [ 2039.352068][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2039.359758][T24424] #PF: supervisor read access in kernel mode [ 2039.365698][T24424] #PF: error_code(0x0000) - not-present page [ 2039.371655][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2039.379164][T24424] Oops: 0000 [#29] PREEMPT SMP KASAN [ 2039.384413][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2039.392087][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2039.402107][T24424] Workqueue: events bpf_prog_free_deferred [ 2039.407894][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2039.413756][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2039.433323][T24424] RSP: 0018:ffff888068120d60 EFLAGS: 00010806 [ 2039.439361][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2039.447337][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2039.455295][T24424] RBP: ffff888068120d98 R08: ffffffff817dc33b R09: 0000000000000001 [ 2039.463250][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2039.471190][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2039.479147][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2039.488047][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2039.494613][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2039.502552][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2039.510495][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2039.518428][T24424] Call Trace: [ 2039.521687][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2039.529365][T24424] #PF: supervisor read access in kernel mode [ 2039.535305][T24424] #PF: error_code(0x0000) - not-present page [ 2039.541267][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2039.548786][T24424] Oops: 0000 [#30] PREEMPT SMP KASAN [ 2039.554044][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2039.561720][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2039.571749][T24424] Workqueue: events bpf_prog_free_deferred [ 2039.577519][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2039.583375][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2039.602949][T24424] RSP: 0018:ffff888068120990 EFLAGS: 00010806 [ 2039.608990][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2039.616928][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2039.624893][T24424] RBP: ffff8880681209c8 R08: ffffffff817dc33b R09: 0000000000000001 [ 2039.632833][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2039.640781][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2039.648733][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2039.657625][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2039.664180][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2039.672119][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2039.680061][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2039.688000][T24424] Call Trace: [ 2039.691257][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2039.693371][T24424] ================================================================== [ 2039.693374][T24424] BUG: KASAN: slab-out-of-bounds in format_decode+0x52/0x1850 [ 2039.693376][T24424] Write of size 8 at addr ffff88806811ff88 by task kworker/1:2/24424 [ 2039.693378][T24424] [ 2039.693380][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2039.693383][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2039.693385][T24424] ------------[ cut here ]------------ [ 2039.693387][T24424] kernel BUG at mm/slab.c:4179! [ 2039.693389][T24424] invalid opcode: 0000 [#31] PREEMPT SMP KASAN [ 2039.693391][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2039.693393][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2039.693395][T24424] Workqueue: events bpf_prog_free_deferred [ 2039.693399][T24424] RIP: 0010:__check_heap_object+0xcb/0xd0 [ 2039.693404][T24424] Code: 4c 89 d1 4d 89 c8 e8 04 7c 07 00 5b 41 5e 5d c3 49 8b 73 58 41 0f b6 d0 48 c7 c7 47 86 3e 88 4c 89 d1 4d 89 c8 e8 a5 7c 07 00 <0f> 0b 0f 1f 00 55 48 89 e5 53 48 83 ff 10 0f 84 90 00 00 00 48 85 [ 2039.693405][T24424] RSP: 0018:ffff88806811fb78 EFLAGS: 00010046 [ 2039.693409][T24424] RAX: 00000000000007a2 RBX: 0000000000001a10 RCX: 000000000000000c [ 2039.693411][T24424] RDX: 000000000000000c RSI: 0000000000000008 RDI: 0000000000000001 [ 2039.693413][T24424] RBP: ffff88806811fb88 R08: 0000000000000000 R09: fffff940003408f1 [ 2039.693416][T24424] R10: ffff88806811fc50 R11: ffff8880a1b29540 R12: 01fffc0000010200 [ 2039.693418][T24424] R13: 0000000000000008 R14: ffff88806811e240 R15: ffffea0001a04780 [ 2039.693421][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2039.693423][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2039.693425][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2039.693427][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2039.693430][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2039.693431][T24424] Call Trace: [ 2039.693433][T24424] ? sprintf+0x71/0x90 [ 2039.693434][T24424] ? msg_print_text+0x16e/0x4a0 [ 2039.693436][T24424] ? __kasan_check_write+0x14/0x20 [ 2039.693438][T24424] ? do_raw_spin_lock+0xea/0x2d0 [ 2039.693439][T24424] ? console_unlock+0x4e4/0xef0 [ 2039.693441][T24424] ? __down_trylock_console_sem+0x180/0x1b0 [ 2039.693443][T24424] ? vprintk_emit+0x21c/0x3a0 [ 2039.693444][T24424] ? vprintk_emit+0x239/0x3a0 [ 2039.693446][T24424] ? vprintk_default+0x28/0x30 [ 2039.693448][T24424] ? vprintk_func+0x158/0x170 [ 2039.693449][T24424] ? printk+0x62/0x8d [ 2039.693451][T24424] ? no_context+0x66d/0xc80 [ 2039.693453][T24424] ? no_context+0x6e3/0xc80 [ 2039.693459][T24424] ? __bad_area_nosemaphore+0x108/0x470 [ 2039.693461][T24424] ? vprintk_emit+0x239/0x3a0 [ 2039.693463][T24424] ? bad_area_nosemaphore+0x2d/0x40 [ 2039.693464][T24424] ? __do_page_fault+0x1a4/0x1f0 [ 2039.693466][T24424] ? do_page_fault+0x99/0xb0 [ 2039.693467][T24424] ? page_fault+0x39/0x40 [ 2039.693469][T24424] ------------[ cut here ]------------ [ 2039.693473][T24424] Bad or missing usercopy whitelist? Kernel memory overwrite attempt detected to SLAB object 'task_struct(23:syz1)' (offset 5038, size 1)! [ 2039.693476][T24424] WARNING: CPU: 1 PID: 24424 at mm/usercopy.c:79 usercopy_warn+0xb7/0xc0 [ 2039.693477][T24424] Modules linked in: [ 2039.693480][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2039.693483][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2039.693485][T24424] Workqueue: events bpf_prog_free_deferred [ 2039.693488][T24424] RIP: 0010:usercopy_warn+0xb7/0xc0 [ 2039.693493][T24424] Code: 37 2c 07 07 01 48 c7 c3 7f 55 3f 88 48 0f 44 d8 48 c7 c7 9c ad 3e 88 4d 89 e1 31 c0 41 56 41 57 53 e8 4d dd 92 ff 48 83 c4 18 <0f> 0b e9 70 ff ff ff 66 90 55 48 89 e5 41 57 41 56 53 48 c7 c0 06 [ 2039.693494][T24424] RSP: 0018:ffff88806811f4a8 EFLAGS: 00010082 [ 2039.693498][T24424] RAX: b3ae5a159bf78c00 RBX: ffffffff883f557f RCX: ffff88805a6226c0 [ 2039.693500][T24424] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 2039.693502][T24424] RBP: ffff88806811f4d0 R08: ffffffff817d7cd9 R09: ffffed1015d644d6 [ 2039.693505][T24424] R10: ffffed1015d644d6 R11: 0000000000000000 R12: ffff888096baed80 [ 2039.693507][T24424] R13: ffffffff883e8647 R14: 0000000000000001 R15: 00000000000013ae [ 2039.693509][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2039.693511][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2039.693514][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2039.693516][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2039.693518][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2039.693519][T24424] Call Trace: [ 2039.693521][T24424] ? sprintf+0x71/0x90 [ 2039.693523][T24424] ? msg_print_text+0x16e/0x4a0 [ 2039.693524][T24424] ? __kasan_check_write+0x14/0x20 [ 2039.693526][T24424] ? do_raw_spin_lock+0xea/0x2d0 [ 2039.693528][T24424] ? console_unlock+0x4e4/0xef0 [ 2039.693529][T24424] ? __down_trylock_console_sem+0x180/0x1b0 [ 2039.693531][T24424] ? vprintk_emit+0x21c/0x3a0 [ 2039.693533][T24424] ? vprintk_emit+0x239/0x3a0 [ 2039.693534][T24424] ? vprintk_default+0x28/0x30 [ 2039.693536][T24424] ? vprintk_func+0x158/0x170 [ 2039.693537][T24424] ? printk+0x62/0x8d [ 2039.693539][T24424] ? no_context+0x66d/0xc80 [ 2039.693541][T24424] ? no_context+0x6e3/0xc80 [ 2039.693542][T24424] ? __bad_area_nosemaphore+0x108/0x470 [ 2039.693544][T24424] ? vprintk_emit+0x239/0x3a0 [ 2039.693546][T24424] ? bad_area_nosemaphore+0x2d/0x40 [ 2039.693547][T24424] ? __do_page_fault+0x1a4/0x1f0 [ 2039.693549][T24424] ? do_page_fault+0x99/0xb0 [ 2039.693551][T24424] ? page_fault+0x39/0x40 [ 2039.693553][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2039.693555][T24424] #PF: supervisor read access in kernel mode [ 2039.693557][T24424] #PF: error_code(0x0000) - not-present page [ 2039.693558][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2039.693567][T24424] Thread overran stack, or stack corrupted [ 2039.693568][T24424] Oops: 0000 [#32] PREEMPT SMP KASAN [ 2039.693571][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2039.693573][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2039.693575][T24424] Workqueue: events bpf_prog_free_deferred [ 2039.693578][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2039.693583][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2039.693584][T24424] RSP: 0018:ffff88806811f140 EFLAGS: 00010806 [ 2039.693588][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2039.693590][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2039.693592][T24424] RBP: ffff88806811f178 R08: ffffffff817dc33b R09: 0000000000000001 [ 2039.693594][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2039.693597][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2039.693599][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2039.693601][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2039.693603][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2039.693606][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2039.693608][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2039.693609][T24424] Call Trace: [ 2039.693611][T24424] ? sprintf+0x71/0x90 [ 2039.693612][T24424] ? msg_print_text+0x16e/0x4a0 [ 2039.693614][T24424] ? __kasan_check_write+0x14/0x20 [ 2039.693616][T24424] ? do_raw_spin_lock+0xea/0x2d0 [ 2039.693618][T24424] ? console_unlock+0x4e4/0xef0 [ 2039.693619][T24424] ? __down_trylock_console_sem+0x180/0x1b0 [ 2039.693621][T24424] ? vprintk_emit+0x21c/0x3a0 [ 2039.693623][T24424] ? vprintk_emit+0x239/0x3a0 [ 2039.693624][T24424] ? vprintk_default+0x28/0x30 [ 2039.693626][T24424] ? vprintk_func+0x158/0x170 [ 2039.693627][T24424] ? printk+0x62/0x8d [ 2039.693629][T24424] ? no_context+0x66d/0xc80 [ 2039.693631][T24424] ? no_context+0x6e3/0xc80 [ 2039.693632][T24424] ? __bad_area_nosemaphore+0x108/0x470 [ 2039.693634][T24424] ? vprintk_emit+0x239/0x3a0 [ 2039.693636][T24424] ? bad_area_nosemaphore+0x2d/0x40 [ 2039.693637][T24424] ? __do_page_fault+0x1a4/0x1f0 [ 2039.693639][T24424] ? do_page_fault+0x99/0xb0 [ 2039.693640][T24424] ? page_fault+0x39/0x40 [ 2039.693643][T24424] BUG: unable to handle page fault for address: fffffbfff4006000 [ 2039.693645][T24424] #PF: supervisor read access in kernel mode [ 2039.693647][T24424] #PF: error_code(0x0000) - not-present page [ 2039.693648][T24424] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8da56067 PTE 0 [ 2039.693656][T24424] Thread overran stack, or stack corrupted [ 2039.693658][T24424] Oops: 0000 [#33] PREEMPT SMP KASAN [ 2039.693660][T24424] CPU: 1 PID: 24424 Comm: kworker/1:2 Not tainted 5.3.0-rc5+ #86 [ 2039.693663][T24424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2039.693664][T24424] Workqueue: events bpf_prog_free_deferred [ 2039.693667][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2039.693672][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2039.693674][T24424] RSP: 0018:ffff88806811ed70 EFLAGS: 00010806 [ 2039.693677][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2039.693680][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2039.693682][T24424] RBP: ffff88806811eda8 R08: ffffffff817dc33b R09: 0000000000000001 [ 2039.693684][T24424] R10: fffffbfff117be85 R11: 0000000000000000 R12: ffffffffa0030000 [ 2039.693686][T24424] R13: 0000000000000000 R14: ffffffffff7a5bf8 R15: ffff8880a81d1878 [ 2039.693689][T24424] FS: 0000000000000000(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2039.693691][T24424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2039.693693][T24424] CR2: fffffbfff4006000 CR3: 000000002a55a000 CR4: 00000000001406e0 [ 2039.693695][T24424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2039.693698][T24424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2039.693699][T24424] Call Trace: [ 2039.693700][T24424] Modules linked in: [ 2039.693703][T24424] CR2: fffffbfff4006000 [ 2039.693705][T24424] ---[ end trace 0f7a4dd451e95722 ]--- [ 2039.693707][T24424] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2039.693711][T24424] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2039.693713][T24424] RSP: 0018:ffff888068127828 EFLAGS: 00010806 [ 2039.693716][T24424] RAX: 1ffffffff4006000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2039.693719][T24424] RDX: ffff88805a6226c0 RSI: ffffffffff7a5bf8 RDI: ffffffffa0030000 [ 2039.693720][T24424] RBP: ffff888068127860 R08: ffffffff817dc33b R09: [ 2039.693725][T24424] Lost 9 message(s)!