e45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:39:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x2}, 0x0) 04:39:47 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f0000000700)=""/37, 0x25}], 0x5, &(0x7f00000007c0)=""/180, 0xb4}, 0x8060) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r6 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x89f2, &(0x7f0000000100)={'sit0\x00', @empty=[0x0, 0x0, 0x43]}) r7 = openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r7, &(0x7f0000003bc0)=ANY=[@ANYBLOB="2b00000020e01bc65375e91cb09adb60b2efb49d6f0142e7cf6b72333eb10d7407519d32fa7668a51ec3c85c2371473527c8eca2665dbd64"], 0xffffffffffffffe0) r8 = socket$kcm(0xa, 0x6, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r8, 0x89e0, &(0x7f0000000240)={r6, r9}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003b00)={r9, 0xc0, &(0x7f0000003a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003900)=0x3, 0x0, 0x0, 0x0, &(0x7f0000003940)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000003980)={0x1, 0x8, 0xffff, 0x100000001}, &(0x7f00000039c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003a00)=0x5}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000003b80)={r7, 0x10, &(0x7f0000003b40)={&(0x7f0000003840)=""/187, 0xbb, r10}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=r10, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x13, 0x9, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x586, 0x0, 0x0, 0x0, 0x3f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x59}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000240)='syzkaller\x00', 0x8, 0xf0, &(0x7f00000002c0)=""/240, 0x41100, 0xf, [], r4, 0x16, r11, 0x8, &(0x7f0000000900)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000940)={0x1, 0x9, 0x3f}, 0x10}, 0x70) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000000)={'vxcan1\x00', 0x400}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="00638614abe52affd37ebe9aeef4cb40ae875ded0082bdb67179e832fa39bd96d3f2"], 0x90ad) 04:39:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000000bd1300008bc71dee9500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x9}, 0x10}, 0x70) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x13, 0x0, 0xffff, &(0x7f0000000040)=[0x0, 0x0], 0x400000000000012a}, 0x20) 04:39:47 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2643.888096][ T5322] device nr0 entered promiscuous mode 04:39:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400772339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:39:47 executing program 4: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, r3, 0x7, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) 04:39:47 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:47 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:39:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x2}, 0x0) 04:39:48 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f0000000700)=""/37, 0x25}], 0x5, &(0x7f00000007c0)=""/180, 0xb4}, 0x8060) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r6 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x89f2, &(0x7f0000000100)={'sit0\x00', @empty=[0x0, 0x0, 0x43]}) r7 = openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r7, &(0x7f0000003bc0)=ANY=[@ANYBLOB="2b00000020e01bc65375e91cb09adb60b2efb49d6f0142e7cf6b72333eb10d7407519d32fa7668a51ec3c85c2371473527c8eca2665dbd64"], 0xffffffffffffffe0) r8 = socket$kcm(0xa, 0x6, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r8, 0x89e0, &(0x7f0000000240)={r6, r9}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003b00)={r9, 0xc0, &(0x7f0000003a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003900)=0x3, 0x0, 0x0, 0x0, &(0x7f0000003940)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000003980)={0x1, 0x8, 0xffff, 0x100000001}, &(0x7f00000039c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003a00)=0x5}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000003b80)={r7, 0x10, &(0x7f0000003b40)={&(0x7f0000003840)=""/187, 0xbb, r10}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=r10, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x13, 0x9, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x586, 0x0, 0x0, 0x0, 0x3f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x59}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000240)='syzkaller\x00', 0x8, 0xf0, &(0x7f00000002c0)=""/240, 0x41100, 0xf, [], r4, 0x16, r11, 0x8, &(0x7f0000000900)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000940)={0x1, 0x9, 0x3f}, 0x10}, 0x70) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000000)={'vxcan1\x00', 0x400}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="00638614abe52affd37ebe9aeef4cb40ae875ded0082bdb67179e832fa39bd96d3f2"], 0x90ad) 04:39:48 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:39:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000001500)=ANY=[@ANYBLOB="9feb000000000000280000753b2a27f51bcb44cde7f1041ff70028000000030000fdffffff00005f60fde2510200000000000000000000008000000100008ee0fbfe83cb77a7ed7f0729f537a2d24a"], &(0x7f0000000100)=""/213, 0x42, 0x288, 0xfffffffffffffffd}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001480)={r0, 0xc0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=0x3f, 0x0, 0x0, 0x0, &(0x7f00000012c0)={0x6, 0x4}, 0x0, 0x0, &(0x7f0000001300)={0x1, 0x13, 0x8, 0xffff}, &(0x7f0000001340)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)=0x7}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000014c0)=r1, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001200)={0xffffffffffffffff, 0x10, &(0x7f0000000000)={&(0x7f0000000200)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001240)=r2, 0x4) 04:39:48 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cffffff}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2644.638645][ T5363] device nr0 entered promiscuous mode 04:39:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400782339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:39:48 executing program 4: r0 = socket$kcm(0xa, 0x0, 0x11) r1 = socket$kcm(0x11, 0x2, 0x300) socketpair(0x2, 0x4, 0x3, &(0x7f0000000080)) sendmsg$kcm(r1, &(0x7f0000001900)={&(0x7f0000000500)=@nfc={0x27, 0x1}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000580)='\f', 0x1}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000002600)={&(0x7f0000002240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x5, 0x7, 0x104, 0x0, 0xffffffffffffffff, 0x200000000, [], r2}, 0x3c) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f0000000000)=@in6={0x2, 0x4e23, 0x0, @ipv4={[], [], @dev}}, 0x1d2, 0x0}, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f00000001c0)='veth0\x00') sendmsg$kcm(r3, &(0x7f0000000900)={&(0x7f0000000680)=@caif=@rfm={0x25, 0xfffffffffffffffd, "e1b1b95b3d2b8b7cb625a021b9e46caa"}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000700)="6fbe40e3d325779fac4587630688fd1a2f3a4c60811baeeba0c2cd14383f2f09a736c0596a6fa09573e788e47958780792aaae2c35f9df13d6f003e69c6129fca3cd6a", 0x43}, {&(0x7f0000000180)="df97c57e947ee11ccab53853", 0xc}, {&(0x7f0000000780)="5057015f93fbc2ba77ac5cb967b8c3fa9a150a3e90e5f5d130fcae98f4c58f11568c1032ddf2c3094a78ee0f054ff785c4b76542cbb661c4d3c5713c9c0ab6ca25d0da7ec6178b51abe829762657837f747dc8cd284b40fd4f31a505ac211e1a1a0ad77c252f4a76d4717fefc161f552de1fdce422df7ab2dfce095c860bc4661bb3", 0x82}, {&(0x7f0000000840)="ea606ed4f0134b1b9f69c119e726e46d6fd5a5078703295addd5d0fa60099aea7e40aa1c85557d810df1dff0d4bf8ac3c0834849cc1f435e1bb4ed7d13355efbc77d12", 0x43}], 0x4}, 0x8040010) sendmsg$sock(r0, &(0x7f0000000640)={&(0x7f0000000100)=@isdn={0x22, 0x8, 0x3, 0xffff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)="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", 0xfb}, {&(0x7f00000002c0)="a7da504fb345ace5c96b7536f4921050f8a7d12733cbb6840a2546a7cbf27ee012c3ecc16174bcd4df5f4c959cd87ccb121d4c673d40978a7f1a8a844c50555b450be3cf3bc9e35440baea45d1c701f43afa8ca055f279823e7a2acc386cfc22cad6307fd563c4e914e720c3ea8d794d4bdfc55a088c045ddcbf6e45becc4edddbd4aa2c9113cf77398ccbd5e0d911afa9d09b61db0c393636d9bffa5e98053c1722dbe1967f5726cc66804cff56ed145c17b41c2e8f7222b200939ed7855e0178f4dd6e5aa042b41f208595bb44ae452de10542a189f66b874a4a27233d9788cdebbdef6adf44d686d1fc9dad1e3e342e8ddaf0d1aaecff", 0xf8}, {&(0x7f00000003c0)="418acac6e200db0b872d98fab25defeb132f3486483109f4ddc707a8a15932fec2b072815105d75e689b12ddc86e75414ce20ba0d7e6115e91d90d6b9d96255bc16b15c00e80608bf2cbd56049fba1a91b1d091fa98edbd424c5b09aa2774b3d60f1d25674ef91626e27ed5f65ceae7d61154d09cf17a0cca28c23203920d95cb28f", 0x82}, {&(0x7f0000002640)="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", 0x1000}], 0x5, &(0x7f00000005c0)=[@timestamping={{0x14, 0x1, 0x25, 0x82c}}, @mark={{0x14, 0x1, 0x24, 0x6a}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0xc62b}}, @txtime={{0x18, 0x1, 0x3d, 0x86d}}], 0x78}, 0x40000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000980)={&(0x7f0000000940)='./file0\x00', r4}, 0x10) socket$kcm(0x29, 0x1, 0x0) 04:39:48 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:39:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:48 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f0000000700)=""/37, 0x25}], 0x5, &(0x7f00000007c0)=""/180, 0xb4}, 0x8060) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r6 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x89f2, &(0x7f0000000100)={'sit0\x00', @empty=[0x0, 0x0, 0x43]}) r7 = openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r7, &(0x7f0000003bc0)=ANY=[@ANYBLOB="2b00000020e01bc65375e91cb09adb60b2efb49d6f0142e7cf6b72333eb10d7407519d32fa7668a51ec3c85c2371473527c8eca2665dbd64"], 0xffffffffffffffe0) r8 = socket$kcm(0xa, 0x6, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r8, 0x89e0, &(0x7f0000000240)={r6, r9}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003b00)={r9, 0xc0, &(0x7f0000003a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003900)=0x3, 0x0, 0x0, 0x0, &(0x7f0000003940)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000003980)={0x1, 0x8, 0xffff, 0x100000001}, &(0x7f00000039c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003a00)=0x5}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000003b80)={r7, 0x10, &(0x7f0000003b40)={&(0x7f0000003840)=""/187, 0xbb, r10}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=r10, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x13, 0x9, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x586, 0x0, 0x0, 0x0, 0x3f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x59}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000240)='syzkaller\x00', 0x8, 0xf0, &(0x7f00000002c0)=""/240, 0x41100, 0xf, [], r4, 0x16, r11, 0x8, &(0x7f0000000900)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000940)={0x1, 0x9, 0x3f}, 0x10}, 0x70) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000000)={'vxcan1\x00', 0x400}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="00638614abe52affd37ebe9aeef4cb40ae875ded0082bdb67179e832fa39bd96d3f2"], 0x90ad) 04:39:48 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0008000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2645.222382][ T5389] device nr0 entered promiscuous mode 04:39:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:39:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:49 executing program 4: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r3 = getpid() perf_event_open(0x0, r3, 0x7, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000340)='wlan1\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x5, 0x400, 0x3, 0x7ff, 0x0, 0x8000, 0x10, 0x0, 0x1c5, 0x3, 0x1, 0xffffffffffff8000, 0x6, 0x7fff, 0x1, 0xc6, 0xd27, 0x3ff, 0x6, 0x9, 0x0, 0x3, 0x4, 0xffffffffffff0001, 0x0, 0x6, 0x2, 0xffffffffffffff82, 0x7b9, 0x7fff, 0x9, 0x7, 0x7, 0x100000000, 0x0, 0x1, 0x0, 0x1000, 0x1, @perf_bp={&(0x7f0000000280), 0x4}, 0x400, 0x3, 0x1, 0x5, 0x0, 0xb}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x400000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x3}, 0x2c) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4be) mkdir(&(0x7f0000000240)='.\x00', 0x46) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x48001, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001d80)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000001dc0)='rdma.current\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xe5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x4, 0xffffffffffffffff, 0x0) close(r6) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x308) r7 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1000, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r7, &(0x7f0000000000)={&(0x7f00000000c0)=@un=@abs={0x1, 0x0, 0x4e22}, 0x80, &(0x7f0000000a00)=[{0x0}, {0x0}, {&(0x7f0000000900)="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", 0xfa}], 0x3}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)=ANY=[@ANYBLOB="03ffff10000d0000000000396bb0000000000000001027"]) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x29, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8922, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfaD\x00\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') socketpair(0x1e, 0x1, 0x80000000000, &(0x7f00000001c0)={0x0, 0x0}) close(r8) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x127) 04:39:49 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0018000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400792339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:39:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:49 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0030000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:39:49 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f0000000700)=""/37, 0x25}], 0x5, &(0x7f00000007c0)=""/180, 0xb4}, 0x8060) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r6 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x89f2, &(0x7f0000000100)={'sit0\x00', @empty=[0x0, 0x0, 0x43]}) r7 = openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r7, &(0x7f0000003bc0)=ANY=[@ANYBLOB="2b00000020e01bc65375e91cb09adb60b2efb49d6f0142e7cf6b72333eb10d7407519d32fa7668a51ec3c85c2371473527c8eca2665dbd64"], 0xffffffffffffffe0) r8 = socket$kcm(0xa, 0x6, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r8, 0x89e0, &(0x7f0000000240)={r6, r9}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003b00)={r9, 0xc0, &(0x7f0000003a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003900)=0x3, 0x0, 0x0, 0x0, &(0x7f0000003940)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000003980)={0x1, 0x8, 0xffff, 0x100000001}, &(0x7f00000039c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003a00)=0x5}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000003b80)={r7, 0x10, &(0x7f0000003b40)={&(0x7f0000003840)=""/187, 0xbb, r10}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=r10, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x13, 0x9, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x586, 0x0, 0x0, 0x0, 0x3f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x59}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000240)='syzkaller\x00', 0x8, 0xf0, &(0x7f00000002c0)=""/240, 0x41100, 0xf, [], r4, 0x16, r11, 0x8, &(0x7f0000000900)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000940)={0x1, 0x9, 0x3f}, 0x10}, 0x70) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000000)={'vxcan1\x00', 0x400}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:39:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x300) r0 = socket$kcm(0x11, 0xa, 0x300) r1 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f00000001c0)='veth0\x00') sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f00000000c0)=@isdn={0x22, 0x6, 0x3f, 0x40, 0x200}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000000)="aa46b422e8c24c2d35d9a45ed8d39d9cae636decf66796b182742363023410a180c1a15dc44b04b93093", 0x2a}, {&(0x7f0000000280)="6fc80dc1ec0d1d913af22a08a6b6ad9b7a425f6f6ed0b8a7dd52f00893632d97debe2c1a3cff863a1c5af00e11e3d03e482885b2046c39e66b22c9aeeb698be5211a76cdbd9a30db5785bbacf31dffc1f09260f7490b61e00aed8d821c6cae8d8c8d660cbf0828cedab4a00313f7537b8097849fee44ad371d2f79964d7ddd229ef1c8cd5705550f829f4931465cd9982b3199870c77a96dc6a579f074252362b1c4fd5d1de0afb68d3b7889e4816c0d0603ee812403ebaf82c66513612aad982f23061f7bc61b1373a90f63", 0xcc}, {&(0x7f0000000380)="ab010ebef1ac5a25280ed3f528be0d564b8fa3eeadbd099bf1b3eb97df75650cafc1bfef809e13174d0388a7ab5ef4f817c3d2374e541014aff8abdd4c04f24fcb4d1a8c7aa62d2c631a0fe41e2f341dfa738a6c4335d06edd1bfbe7fb96589eafb8705fcb2a885358b574c8b3d0ab8099c173e1b95d398d966a56d7ac5c", 0x7e}, {&(0x7f0000000400)="ae2d21f19b02ef17b07b21e19c2e9d371f03928ab91b2fb6a7e13d6aa2fdd407c2fa8b82990f86b98aaf700a77f5c8c3c012e386fb6e725e9e5768199e3994b3e10d0ebdb83ce7a1a963c0625248c2fb580bd551649b675f1000e42736884e0acab5352f2f21eaaeb3522593a5c3b62c1d39528594140af954baa1ce8a4f6129f7c6b422e5c4ebc2dc8da7c88ce62503e9483d3a964df5da7a92810f517db1bec9fddf257f5fe0ce15760c254a304438f159ce60d6a09ac8addf3f71cc16fe0b005d22456661af59364d", 0xca}, {&(0x7f0000000500)="16fdcfc0a71c29817be6ffe0bf445dedcb02b7d99e35b2f858b8312a4831c09ff430714d551ec238177ebbee67f63dd633adb4aa63f4a25bbafed89b24866af09d9f7093bcee0efeb9942909db84c79849c9177a7f72015b71c30d0998e9d0cecf95b3c5ef15c8812049a2137abd81ee483410eb46c4e7f33554dd81680653822a1eb5cd57dbcb58e8173e27650fb37f520ab28db9031e5cc67c724d9e820193e515db9731c2f53857efc4625456388af93e37c4a1d841ca414b2728ce50ef4b67", 0xc1}], 0x5}, 0x40) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200), 0x4) socket$kcm(0x29, 0x2, 0x0) 04:39:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd", 0x17}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:49 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2070000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:39:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd", 0x17}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd", 0x17}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x17, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0xe1}, [@map={0x18, 0x9, 0x1, 0x0, r0}, @ldst={0x0, 0x2, 0x6, 0x5, 0xb, 0x8, 0xffffffffffffffff}, @ldst={0x1d83e294828d1506, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x93, 0x5, 0x4, 0x0, 0x0, 0x1c}]}, &(0x7f0000000300)='syzkaller\x00', 0x1, 0x96, &(0x7f0000000340)=""/150, 0x40f00, 0x6, [], 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x49}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x5, 0x8000, 0xd425}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000500)={0xffffffffffffffff, r1, 0x3, 0x3}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x7, &(0x7f0000000000)=[{0xfeb, 0x10000, 0x5, 0xf7}, {0xfffffffffffffffd, 0x100, 0x9, 0x49}, {0x1, 0xa4ba, 0xfffffffffffffffc, 0x58}, {0x3, 0x8, 0x3ff, 0xffff}, {0x4, 0x8, 0x7}, {0x29, 0x9, 0x1, 0x40}, {0x9596, 0x0, 0x53}]}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x5, 0xd5e, 0x200, 0xeb, 0x0, 0x401, 0x2000, 0x3, 0x5, 0x7fff, 0x1f, 0x4, 0x8, 0x8, 0x1, 0xc744, 0x65a, 0x5, 0x9, 0x80000000, 0x9, 0x9, 0x8, 0x80000000, 0x7, 0x10001, 0x2, 0x80, 0x1f, 0x217, 0x9, 0x8, 0x9, 0x9, 0x9, 0x9, 0x0, 0x40, 0x4, @perf_bp={&(0x7f0000000180), 0x8}, 0x0, 0x100000000, 0x6, 0x8, 0xfffffffffffffff7}, 0x0, 0x2, 0xffffffffffffffff, 0xc159d6a35b538fe4) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) [ 2646.313653][ T5447] device nr0 entered promiscuous mode [ 2646.477009][ T5451] __nla_validate_parse: 21 callbacks suppressed [ 2646.477017][ T5451] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:39:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec4007a2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:39:50 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce020000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d0001080100", 0x23}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:39:50 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f0000000700)=""/37, 0x25}], 0x5, &(0x7f00000007c0)=""/180, 0xb4}, 0x8060) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r6 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x89f2, &(0x7f0000000100)={'sit0\x00', @empty=[0x0, 0x0, 0x43]}) r7 = openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r7, &(0x7f0000003bc0)=ANY=[@ANYBLOB="2b00000020e01bc65375e91cb09adb60b2efb49d6f0142e7cf6b72333eb10d7407519d32fa7668a51ec3c85c2371473527c8eca2665dbd64"], 0xffffffffffffffe0) r8 = socket$kcm(0xa, 0x6, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r8, 0x89e0, &(0x7f0000000240)={r6, r9}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003b00)={r9, 0xc0, &(0x7f0000003a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003900)=0x3, 0x0, 0x0, 0x0, &(0x7f0000003940)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000003980)={0x1, 0x8, 0xffff, 0x100000001}, &(0x7f00000039c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003a00)=0x5}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000003b80)={r7, 0x10, &(0x7f0000003b40)={&(0x7f0000003840)=""/187, 0xbb, r10}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=r10, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x13, 0x9, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x586, 0x0, 0x0, 0x0, 0x3f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x59}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000240)='syzkaller\x00', 0x8, 0xf0, &(0x7f00000002c0)=""/240, 0x41100, 0xf, [], r4, 0x16, r11, 0x8, &(0x7f0000000900)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000940)={0x1, 0x9, 0x3f}, 0x10}, 0x70) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000000)={'vxcan1\x00', 0x400}) 04:39:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400631, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000009c0)='cpu.stat\x00', 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.clone_children\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000100)=0x4, 0x2d4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) [ 2646.815832][ T5484] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:39:50 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4010000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2646.859111][ T5492] device nr0 entered promiscuous mode [ 2646.872786][ T5496] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2646.887638][ T5497] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:39:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d0001080100", 0x23}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:39:50 executing program 4: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0xfffffffffffffffc, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x16, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x1}, @exit], &(0x7f0000000000)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 04:39:50 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000400)='/dev/net/tun\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x95, 0x0, &(0x7f0000000200)=""/149}, 0x28) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) recvmsg(r2, 0x0, 0x0) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x5c43bce730e3c105) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(0x0, r5, 0x7, r4, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x4) recvmsg$kcm(r2, &(0x7f00000005c0)={0x0, 0xfffffe66, 0x0}, 0x0) write$cgroup_pid(r3, &(0x7f0000000340)=r5, 0x12) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0x7, 0x4) sendmsg$kcm(r2, &(0x7f0000002e40)={0x0, 0x0, 0x0}, 0x40008d0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0xb) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x4) 04:39:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d0001080100", 0x23}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2647.315450][ T5510] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:39:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec4007b2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:39:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f8", 0x29}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:51 executing program 4: socket$kcm(0x2b, 0x1, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) r2 = socket$kcm(0x11, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0xd8, 0x0, 0x1a6}, 0x20) socket$kcm(0xa, 0x6, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) sendmsg(r2, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440), 0x12) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() perf_event_open(0x0, r4, 0x7, r3, 0x0) r5 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000003c0)=r4, 0x12) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = getpid() perf_event_open(0x0, r7, 0x7, r6, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x100000000, 0x8001, 0x2, 0x0, 0x8, 0x400, 0xd, 0xffffffffffffff08, 0x5, 0x8001, 0xcc, 0x3, 0x80, 0x9, 0x10000, 0x800, 0xfffffffffffffffe, 0x20, 0x6, 0x8, 0x40000000, 0x6, 0x7, 0x2, 0x7, 0x6, 0x9, 0x7, 0xbb, 0x5, 0x1ff, 0x100000001, 0xb42, 0x1f5, 0x28, 0x0, 0x5, 0x3, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100c0, 0x3e9e, 0x3ff, 0x3, 0xcf, 0x80000001, 0x7fd0}, r4, 0x5, r6, 0x757ded32b8c84421) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r8, 0x0, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r9, &(0x7f0000000140)}, 0xfffffffffffffc5d) 04:39:51 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:51 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x2) 04:39:51 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f0000000700)=""/37, 0x25}], 0x5, &(0x7f00000007c0)=""/180, 0xb4}, 0x8060) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r6 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x89f2, &(0x7f0000000100)={'sit0\x00', @empty=[0x0, 0x0, 0x43]}) r7 = openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r7, &(0x7f0000003bc0)=ANY=[@ANYBLOB="2b00000020e01bc65375e91cb09adb60b2efb49d6f0142e7cf6b72333eb10d7407519d32fa7668a51ec3c85c2371473527c8eca2665dbd64"], 0xffffffffffffffe0) r8 = socket$kcm(0xa, 0x6, 0x0) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r8, 0x89e0, &(0x7f0000000240)={r6, r9}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003b00)={r9, 0xc0, &(0x7f0000003a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003900)=0x3, 0x0, 0x0, 0x0, &(0x7f0000003940)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000003980)={0x1, 0x8, 0xffff, 0x100000001}, &(0x7f00000039c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003a00)=0x5}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000003b80)={r7, 0x10, &(0x7f0000003b40)={&(0x7f0000003840)=""/187, 0xbb, r10}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=r10, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x13, 0x9, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x586, 0x0, 0x0, 0x0, 0x3f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x59}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000240)='syzkaller\x00', 0x8, 0xf0, &(0x7f00000002c0)=""/240, 0x41100, 0xf, [], r4, 0x16, r11, 0x8, &(0x7f0000000900)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000940)={0x1, 0x9, 0x3f}, 0x10}, 0x70) [ 2647.501193][ T5522] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2647.523962][ T5527] device nr0 entered promiscuous mode 04:39:51 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:51 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) [ 2647.574035][ T5537] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:39:51 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x3) 04:39:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f8", 0x29}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2647.639254][ T5538] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:39:51 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpu.weight.nice\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000200)={0x13b8b27035eec9a4, 0x70, 0x435, 0x71ca, 0x3ff, 0xb050, 0x0, 0x1, 0x14060, 0x8, 0x8, 0x7fff, 0x8000, 0x1, 0x4, 0x9, 0x80000001, 0xfffffffffffff82f, 0x7f, 0x5, 0x0, 0x2, 0x100, 0x1000, 0x800, 0xd11, 0x5, 0x846, 0xffffffff80000001, 0x80, 0xfff, 0x7ff, 0x7, 0xffffffffffffffa3, 0xffffffffffff0001, 0x401, 0x0, 0x101, 0x0, 0xfffffffffffffff9, 0x1, @perf_bp={&(0x7f0000000140)}, 0x20000, 0x9dd, 0xe0b1, 0x0, 0x5, 0x55, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x6) perf_event_open(0x0, r3, 0x7, r2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r2, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x4, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x1029, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0x0, r4, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 04:39:51 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe030000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2648.076145][ T5545] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:39:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec4007c2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:39:52 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'batadv0\x00', 0x200}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xba6, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x3, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group\xca\xectat\x00<\xbet\x19\xc1L\xa6\xa4\x04\x1a\xe5#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0J$\x8f\xb1\x9d\x16Z\x9e%@\xceN\x1d]\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x00\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5v\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x4) perf_event_open(&(0x7f00000005c0)={0x5, 0x70, 0x4, 0x0, 0x0, 0x1000, 0x0, 0x6, 0x8000, 0x8, 0x4, 0x8, 0xfffffffffffffff7, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4a2b, 0x80000000, 0x4, 0x0, 0x1, 0x526, 0x0, 0x4, 0x0, 0x1cba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, @perf_config_ext={0x0, 0x1f}, 0x10348, 0x101, 0x0, 0x6, 0x6, 0x5, 0x96}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) close(0xffffffffffffffff) gettid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xe11f}, 0x0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x2, 0x9, 0x1, 0x0, 0xfff, 0xe0, 0x0, 0xffffffffffff0000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf14, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x9}, 0x0, 0x8c, 0x0, 0x4, 0xfdbe, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) 04:39:52 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x4) 04:39:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f8", 0x29}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:52 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:52 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@ll, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f0000000700)=""/37, 0x25}], 0x5, &(0x7f00000007c0)=""/180, 0xb4}, 0x8060) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89f2, &(0x7f0000000100)={'sit0\x00', @empty=[0x0, 0x0, 0x43]}) r6 = openat$cgroup_ro(r4, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r6, &(0x7f0000003bc0)=ANY=[@ANYBLOB="2b00000020e01bc65375e91cb09adb60b2efb49d6f0142e7cf6b72333eb10d7407519d32fa7668a51ec3c85c2371473527c8eca2665dbd64"], 0xffffffffffffffe0) r7 = socket$kcm(0xa, 0x6, 0x0) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000240)={r5, r8}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003b00)={r8, 0xc0, &(0x7f0000003a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003900)=0x3, 0x0, 0x0, 0x0, &(0x7f0000003940)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000003980)={0x1, 0x8, 0xffff, 0x100000001}, &(0x7f00000039c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003a00)=0x5}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000003b80)={r6, 0x10, &(0x7f0000003b40)={&(0x7f0000003840)=""/187, 0xbb, r9}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=r9, 0x4) 04:39:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f0000", 0x2c}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2648.373502][ T5571] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2648.403919][ T5566] device nr0 entered promiscuous mode 04:39:52 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff5ffa5f}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f0000", 0x2c}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:52 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f0000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) socketpair(0x11, 0x800, 0xa4, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r0, &(0x7f0000005b80)={&(0x7f0000004a40)=@hci, 0x80, &(0x7f0000004b40)=[{&(0x7f0000004ac0)=""/72, 0x48}], 0x1, &(0x7f0000004b80)=""/4096, 0x1000}, 0x41) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000005bc0)='rdma.current\x00', 0x0, 0x0) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, &(0x7f00000002c0)=[{&(0x7f0000001580)="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", 0x101d0}], 0x1}, 0x0) 04:39:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f0000", 0x2c}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec4007d2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:39:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) socketpair(0x11, 0x800, 0xa4, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r0, &(0x7f0000005b80)={&(0x7f0000004a40)=@hci, 0x80, &(0x7f0000004b40)=[{&(0x7f0000004ac0)=""/72, 0x48}], 0x1, &(0x7f0000004b80)=""/4096, 0x1000}, 0x41) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000005bc0)='rdma.current\x00', 0x0, 0x0) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, &(0x7f00000002c0)=[{&(0x7f0000001580)="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", 0x101d0}], 0x1}, 0x0) 04:39:52 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x5) 04:39:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f000064", 0x2d}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:52 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:52 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@ll, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f0000000700)=""/37, 0x25}], 0x5, &(0x7f00000007c0)=""/180, 0xb4}, 0x8060) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89f2, &(0x7f0000000100)={'sit0\x00', @empty=[0x0, 0x0, 0x43]}) r6 = openat$cgroup_ro(r4, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r6, &(0x7f0000003bc0)=ANY=[@ANYBLOB="2b00000020e01bc65375e91cb09adb60b2efb49d6f0142e7cf6b72333eb10d7407519d32fa7668a51ec3c85c2371473527c8eca2665dbd64"], 0xffffffffffffffe0) r7 = socket$kcm(0xa, 0x6, 0x0) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000240)={r5, r8}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003b00)={r8, 0xc0, &(0x7f0000003a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003900)=0x3, 0x0, 0x0, 0x0, &(0x7f0000003940)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000003980)={0x1, 0x8, 0xffff, 0x100000001}, &(0x7f00000039c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003a00)=0x5}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000003b80)={r6, 0x10, &(0x7f0000003b40)={&(0x7f0000003840)=""/187, 0xbb, r9}}, 0x10) 04:39:52 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x6) 04:39:53 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff85}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) socketpair(0x11, 0x800, 0xa4, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r0, &(0x7f0000005b80)={&(0x7f0000004a40)=@hci, 0x80, &(0x7f0000004b40)=[{&(0x7f0000004ac0)=""/72, 0x48}], 0x1, &(0x7f0000004b80)=""/4096, 0x1000}, 0x41) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000005bc0)='rdma.current\x00', 0x0, 0x0) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, &(0x7f00000002c0)=[{&(0x7f0000001580)="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", 0x101d0}], 0x1}, 0x0) [ 2649.253756][ T5613] device nr0 entered promiscuous mode 04:39:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f000064", 0x2d}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) socketpair(0x11, 0x800, 0xa4, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r0, &(0x7f0000005b80)={&(0x7f0000004a40)=@hci, 0x80, &(0x7f0000004b40)=[{&(0x7f0000004ac0)=""/72, 0x48}], 0x1, &(0x7f0000004b80)=""/4096, 0x1000}, 0x41) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000005bc0)='rdma.current\x00', 0x0, 0x0) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, &(0x7f00000002c0)=[{&(0x7f0000001580)="276c5bd6f0db828036f59b152925d176a9e51a4722f8fd829657ff48969c3c5f309ceaf42e7b242b7fe4fa128061aec9827004000c31fd9e31cb1c79990c2b89045ea4dc3ad63a775c80850ea10827e8a40a6c8b5fa7cc514639bb99f13c6a3d0825a738a1a53433042c75230d368c95f8a0b5562b58ecf50fd78e5def7375cd62fb5728535bf371b2ffc7d8058398075e1d0a7a4451395c39f79c26b7287cebd130de7737e77714686b9d67d87a3cf8da02cc70fdc99c1a7c916ae542b9d5baaf1f9daa4fb845fd5d5cad2073a61ce51c345150f84b3900997296d55c7d394af17b01d445465ef377508a1a29a5d6b03b0da22c973f22814fb2a802d50fb1f051e7d95d53d598a0599ec79cd27123fa1d13b7996609d4548e81ef7b1e8de8f32593ef46c3081ab55929a3c1cb1fa28a485518391a76b7b80d5941aa42222cb6f25be29ebc938af75971ffffdd4dea114ac37f38e69cb670020a7448d99b7b5e3d09bcf2625c94d6599182ce9edb0bbfea111dae3b1c9d6cd3162ce0aaebcdcf22a8d29dca0d04ebf5944168f398c500915579070586dff7a2ec6d345d1f69a8c749740aea0dbb2d30c9f7e3afd498a886c906fe09a83322d8e94b3ebe288ec1601e6a16122fa44191b6b3f5315eb0b35cb628540438919b906502eeb7cacc7d15753e456b056e6145ab65ac7c01253f3c5663495a74a0598feed07436a72d3ee1185d0fbcf89e8c5d449e0216cab8110efe923be24366dffc65bb386e7f015bb40b6fd9abbf7180b217f88d99f168c113f3ff187c202e2ae32a0238e43af612678a44a3d8373b6dc6bf820f8bf73e6411c51152f51993c66effe25c6e72a3127da6996f13691ded659e1f9d6eab1124435750dfeb60de2b2d59d9196bda3a3c5cd5054b2960481d50ce28ac4159b54f3f26a9decfc8ab36b6110eda741e21c95e3631b3de40fd3c7828fb0e3c85070eb233d4d4b1b75e0167ec62e81f1a12a0cd2e02a7a43edb384e4d0d59744bbe86611575966efe25b4191f14a368a72c13aeb4de7caff7a9439b583d08714fd22a9b1ff08297a562a859e2d21dd4f8ecf6701bcd9a30d28909c52c56a8ef739f0841ae895ad858121b1ec82ae1bbec856730aba8e2f42841c33caa862fdf8b651d90055b6725e5bf0af348ec550ad23c5a3c15c7455fdb13a57a6e452bdebbeb32200ab7dce3fab98b206ec2571e3de8904bea2265288dbaec64359cb5cd926dc025343fff78e7bdab6f541a3d2b569f37b8339d14e706163854d01ba5380d648391740e1fc2e118557692796acf6e0fa8ab21c5657259bf05a8b510eb285f306c8cdd6e185094b0ff46ec71d5a9b8e344176f263730468db893eaba00c32bdafdb1ebdc3ec441abaf4e7b2db744411ae02f33b340a373ea1a485b88073c2da7bd6828bbe4028fef4c30088c9b28daf899741029da8f52d2927250c582f16ca173c0761ad74364f562f3106a15d17d34ff27abc49b8a7d9aa3d2d2bd5c406c9fe21e59ffad1a85c3d1283f983efaab087a92ce4bc66c934605b658f56857301278b09f5e22ba0034a3944ae27bd20cf9cd4a7d1973d4818716d0bf71d922d74ef68ede2604a98f6db652206e0a34ceed21cb950eebbee9686fc368e2b42f9417b22ab84c1a341630f962560900e02f20cc0ed618e657fe4ede15f9a105620dd2206dbd74ba7f061f2d058a127f5ecb72ad12264d81816d82169d668adf80bbdd279c684e11980f72ba126d0326dbfe6736d2b737069e0c5efb7e76276f10fa915907d91282084fa9a12c5636fd265ef705f49adc9924ffcc68742b17c9212fe8abcc49e4db91ee543a7fd438e59d030d6fa1c31ebe151f9c44af0069df608f0395159c41339aaf31b4c3e67526036c7f4d96fdd5afa5c4c85f2a6648098dccd6a49a8250e26bce3ca0e78976c961432783947e3a8ff5430af9cfebf3d2ee72153b7bd4d7f2cce79da6defba02cc5a73f7fa137c01a2cea52a961d9504d959aec7e2627fc33d07ef45bb8afbded876bee54c7f2feacf548bbab68a782e7bbcb6140d6c6b3fbe1108a6f4dd750c0424a9e1e0b8f239c4739f28463a23fe011cb8c98e25126c5693f19f16ab8a4b6351ff2955a397c3618ae47c78b2d123c334082f9aae0d7f9e7b761d58ef7e1f6dd20a23c7bcc3e84dbc75551573c425e5d56ca84e263b22c2ed5ff1255e500c1810574ff1af28114221fa6e72439d5fc117700bf5a7e01e2ffc0cfeabfddb8ae217a7033c9c8dce5a685ca7a0f4ceeb153ab2ae77652e1d73e9510f868b70270e386664ab4c45ddf353e61aef1ac0c673502b7e7faae557df3eaa5fd0a3a00c54f23723ce6406f616f678b6f789c57e09864895dd8a1e5da9ff0bc7be9f9174af99e157e4c71ed69c71783abb3ad18141d99e49ef32614b8ac29eb50f64b2355f4b599acbdf039877d68275a2ebeb0729791412dfd3194cc2cb4f045a4d2ac74afffec582df03ce4afd2aedc594c6cd34a4cd21d4ea653b04d49a8aa1e942df36b530c90d0c2c62ef8369677ce2ffd4304b0410ff9ef86be8afbf55adc6abca02acf03dcab2fe5339ab0eb9d79dfc4817c5e2c10676904192395d9b8552760b0fa79add2769284a0ef5ebc4d61e64dc9a8b2d4770cdb4be4345026f6d04549140f4bb01e8252eb06d70afd84247f8023a0cc31329499a0efcd8a79e0832992a96b437258ab186c6a9c8f2e55fe7319605453b888d928730a11a11b4f56eec25b4c18b2205aad508a9f6850e6e23103a517cf43af019d54593803b76a3529777a58441d781d2eb509fcb723ba3be91d12c809f0148095e2066e1b0f0656ceeb751ad610e265bd4bc1b67f5e521ef420420e9b7e137f29240d63a42d678c1739f33f39a09a0f4c5249f808f41152a07ce9bfcc94e35683bea83f82a5e34e1fef3f8ea2cf4c9f1c8ccef87d7f58fc1b4ace6cb667e62ed1f54f72b3a156551d96f9a16ff4864ae3a01dc86b5c65e6676493f07d7257b34d8c6c5851334a4542dd2bea4aef4f444b5f26ac89a27e3313a4a66bdad09382357f1adbd61d526a2541022814cc4b2515aec30f74729d1a5826a3206c02ccd6adfb6c2b6c7aee33b7213bdbc5878151b50d1a8fdc1b2b9b44a01606770028723c848e1faf60b89de5a2e72b7d19f7745f7c89989ab2a8174291ad7d0f2b172672aba9f4a1b42df53baf6d353b45d755eff7526efa8a87a2aeaf84d9a434e8844a98eab172fa474b353f19e1231aca846d93eb24e650e015a42c578d23d794c02304ff72e358ea5c75f6709e587951d3900b3b1066ddd4a2fe9186d0cfcfcc7e33e9b882e8c2242ba990face580f94d66bb6a5212190fba3c1f1e046738c422d9e94ed6671157af9145bcfe7fd0d431a7a7c84a3eec802794286e2dc2b59e93fcb09ea22a1e47ee8f0b3cf756fb67bc3676819cbc67396322ea6be61552533b52a2fd258e82dc7c57a09211cce3e785f5b4deacae7b9dcd48080c9edb03d935c9c9a426bb6d3ec71e559af61b796827b5e425c991d3485381e0842b35cb0ad91154f4a13117b35d2a9ebfcf0ef68d73093dd483923f7b3a00e9c04c0eec31effc9f908f38949e1766409fc9c8cc48f95d4d537520159dd794edb56e824d31c67d9c7cbefdb51860a8d1f859baa9bf5c2752d00b6969e94d47a88be798f6df9e6b5977a56206c33a38e74ac5de0b23489c9f5a037e13ae0194beb9f954c6b8ebefa78194a4e891c12ddb43019e60d9b8e7fe78df65a83671b76fd1a9c7be064c6d822bb0749d2162168821484ab78f906cb990167a2f9e19a33be2086dd55e54cb8b6dbcd6d1cc9b4c828472d55db6f175547f73db54d142f290ef99e8e26f2c6ebc7a53bfe31fe1eb2ac6a13dd0081debcc346cc0d3407ff158bc48a314a18b7fa781e32b66f9eaa792031567fa8d5c33fd85ebf85af958ef84c0c69f2bc3f842bff08b4b3112a6ac24a78c9476f15d40de489e50fb5e426167a10739db436cb1a63f5e7b3baf7c21c3506d3021c487ce4625f66a18468c89c3a9c94c7c1c2676e1f21a26bc393cf83e7bdf9bf66c2e9dd080574e1a80fe152124e5191c9367f22b4a712322986165964ccc2b016f0fc52e69d009a2f9fc13f344153f17bcebf937f59714f44dfdc11e69c7216cdb4f4d2143222e41d7415b3ef52e45477f62def841cea29c6258a2a2d8c7895712c51025ed7fd5d68bf8aa5a96fbbba98090dac42ad69522f47288af9f6f7acd2406c42706a940300ab41a59488966dc63f4ce8a6e6e7b18c1cf7b3e5013441ad0d7f201343e4a64da2cd513782877cb35d00f2113147ec4d7410971968daa76b1b9ad115c9ef6e8fe6abeb8b372806dbccb26f504f3fb8fb26c97fc6dcc7091f2f940e76fc121b39f215cb5ee96383b0ad5dcb2f7671e1d75612b3992a8bfd9ef25545b75845991f64a26c87a8abbdde668be3e6fb8ebdc31e73eb4eafda15215e0b545907a86c0fa3d5f1af4cf096cd7ec9c31dd57851203a2ce0c4cfecefe63e43ec9335f00fe3195965d0602bdf0fb36a8b4c6a538f18c002895f4d33968901c0228fbbfd250ae07075c9c3d8e3233027ca1ba82586797b9c3fd5c256c9562789f4393908ecba4bbd26a49672d71098198efe77b3661a2114c3b919330e67cd0ae6e90d88e1922750b6d36bde8926f9c635fbe0b1016f016af69965d762ebcab348ea4fe695007c9e1f91b8f7019a3206627751c8216dae9857569f152888ba8876b51d5d73bffb3c5544500e1121d72a0d2ca9b382bae36c36fdb5680b5973ec3529eefc2077654f5ec0021d473c221d544d6c0b56c48926ece451f01bd3b2746f6ccb0a44a2e934eefbc24c8f4ced796e4941bb6363d2bf0af8834e0dde49632c228477fcbae8d6667c5996aeb14eac620e35a1b3a3b29c4122c91f92a2f9917291c04cfb9ef91215d8b0dffccd082474c9a2ee26ab2139d4428c74efd41f820d671b4255253abad18028b4d19715ba084eaa884dcc975da4c316ac3f8c056a2dc1215bd1db2fd504169e6dab0494bc8e02d4374f061c517d424b0050b678fb240df83d19c0f9a71465541f706cf976f6f653a216dc290698158864c941067577cc0b54c8ccae532de0ec0ddc67d4a22f5c9dcee990b7ae21567991bb1fa1f83d51114f00248735a3b884311b695a65fe6671db499588fd69c79baa8962d6f4331e3dda9b3d7075b2240d58cbe88521c4bfab84066a6b69fbcbc3cb6cbf", 0x101d0}], 0x1}, 0x0) 04:39:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@l2, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/240, 0xf0}, {&(0x7f0000000240)=""/123, 0x7b}], 0x2, &(0x7f00000002c0)=""/89, 0x59}, 0x1c002) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.thre\aS0\xcb\xdf\x81q\xc21\x83\x12\xcd\x93\xa5ads\x00', 0x2, 0x0) 04:39:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec4007e2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:39:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f000064", 0x2d}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:53 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x7) 04:39:53 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@ll, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f0000000700)=""/37, 0x25}], 0x5, &(0x7f00000007c0)=""/180, 0xb4}, 0x8060) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89f2, &(0x7f0000000100)={'sit0\x00', @empty=[0x0, 0x0, 0x43]}) r6 = openat$cgroup_ro(r4, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r6, &(0x7f0000003bc0)=ANY=[@ANYBLOB="2b00000020e01bc65375e91cb09adb60b2efb49d6f0142e7cf6b72333eb10d7407519d32fa7668a51ec3c85c2371473527c8eca2665dbd64"], 0xffffffffffffffe0) r7 = socket$kcm(0xa, 0x6, 0x0) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000240)={r5, r8}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003b00)={r8, 0xc0, &(0x7f0000003a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003900)=0x3, 0x0, 0x0, 0x0, &(0x7f0000003940)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000003980)={0x1, 0x8, 0xffff, 0x100000001}, &(0x7f00000039c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003a00)=0x5}}, 0x10) 04:39:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xa) 04:39:53 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:53 executing program 5 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2650.070306][ T5666] FAULT_INJECTION: forcing a failure. [ 2650.070306][ T5666] name failslab, interval 1, probability 0, space 0, times 0 [ 2650.098324][ T5666] CPU: 1 PID: 5666 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 2650.106175][ T5666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2650.116229][ T5666] Call Trace: [ 2650.119535][ T5666] dump_stack+0x172/0x1f0 [ 2650.123877][ T5666] should_fail.cold+0xa/0x15 [ 2650.128481][ T5666] ? release_sock+0x156/0x1c0 [ 2650.133168][ T5666] ? fault_create_debugfs_attr+0x180/0x180 [ 2650.138981][ T5666] ? page_to_nid.part.0+0x20/0x20 [ 2650.144013][ T5666] ? ___might_sleep+0x163/0x280 [ 2650.148870][ T5666] __should_failslab+0x121/0x190 [ 2650.153808][ T5666] should_failslab+0x9/0x14 [ 2650.158317][ T5666] kmem_cache_alloc_node+0x268/0x740 [ 2650.163615][ T5666] __alloc_skb+0xd5/0x5e0 [ 2650.167943][ T5666] ? netdev_alloc_frag+0x1b0/0x1b0 [ 2650.173058][ T5666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2650.179295][ T5666] ? netlink_autobind.isra.0+0x228/0x310 [ 2650.179310][ T5666] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 2650.179326][ T5666] netlink_sendmsg+0x972/0xd60 [ 2650.179345][ T5666] ? netlink_unicast+0x710/0x710 [ 2650.179359][ T5666] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2650.179374][ T5666] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2650.179388][ T5666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2650.179404][ T5666] ? security_socket_sendmsg+0x8d/0xc0 [ 2650.191274][ T5666] ? netlink_unicast+0x710/0x710 [ 2650.191294][ T5666] sock_sendmsg+0xd7/0x130 [ 2650.191311][ T5666] ___sys_sendmsg+0x803/0x920 [ 2650.191328][ T5666] ? copy_msghdr_from_user+0x440/0x440 [ 2650.191345][ T5666] ? __fget+0xa3/0x560 [ 2650.191365][ T5666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2650.201021][ T5666] ? __fget+0x384/0x560 [ 2650.201041][ T5666] ? ksys_dup3+0x3e0/0x3e0 [ 2650.201063][ T5666] ? __fget_light+0x1a9/0x230 [ 2650.201077][ T5666] ? __fdget+0x1b/0x20 [ 2650.201088][ T5666] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2650.201107][ T5666] __sys_sendmsg+0x105/0x1d0 [ 2650.248398][ T5666] ? __sys_sendmsg_sock+0xd0/0xd0 [ 2650.248425][ T5666] ? switch_fpu_return+0x1fa/0x4f0 [ 2650.248442][ T5666] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2650.248459][ T5666] __x64_sys_sendmsg+0x78/0xb0 [ 2650.248479][ T5666] do_syscall_64+0xfd/0x6a0 [ 2650.263231][ T5666] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2650.263242][ T5666] RIP: 0033:0x4598e9 [ 2650.263256][ T5666] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2650.263264][ T5666] RSP: 002b:00007fc3c2e13c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2650.263277][ T5666] RAX: ffffffffffffffda RBX: 00007fc3c2e13c90 RCX: 00000000004598e9 [ 2650.263290][ T5666] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000000000004 [ 2650.271995][ T5666] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:39:54 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe4}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2650.272003][ T5666] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc3c2e146d4 [ 2650.272010][ T5666] R13: 00000000004c7777 R14: 00000000004dcfd8 R15: 0000000000000005 04:39:54 executing program 5 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:54 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000008c0)={0x0, 0x70, 0x1f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0xffffffffffffff6c, 0x538d, 0x0, 0xffffffffffffffe1, 0xfffffffffffffffc, 0x40, 0x8, 0x0, 0xffffffff, 0x7, 0x5, 0x0, 0x0, 0x0, 0x3997, 0x0, 0x1, 0xffff, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x6, 0x9, 0x7}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x9, 0x68, 0xc, 0x0, 0x0, 0x7, 0x20, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0xdfd, 0x4, 0x2, 0x0, 0x0, 0x80000001, 0x8, 0x36cf000000, 0x0, 0x0, 0xfffffffffffffffe, 0x7, 0x0, 0x376, 0x0, 0x0, 0x0, 0x8, 0x3, 0x0, 0xfff, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x8, 0x3}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000740)=""/167, 0xa7}, {0x0}, {0x0}], 0x3, &(0x7f0000000bc0)=""/150, 0x96}, 0x10002) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x15}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)=0xffb7) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r2, &(0x7f0000000240)='io.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000d80)='/group.stat\x00\f=\xf8\xb4\xc8\x1fdZ?\x9c\xca\x9f\xf2\xfc\x16S\xe4\xe6\xc9h\nC\xcc\x90D\f\"\xe3\x886\xd4\x898Hs\\*a\xbb\xf9DG\xc9\xb5\x87^\x1e\xe4{\x10\xa2\x10h\x8cY\x03\xf1\x81\xb9\xda\x8b\x1a\x05\x1e\x16\xad\x96\xd6\xd7\xeaT`,\x11vazH-\x17\xf8\xce\x9a\x1b\xda\xc4<\x92\n\xbaGc|\xc5\x97\xceO\x87!\xf8\xb8T\xd9\xc34!6;\xddT\xdc9!7\xb7/^\x1cN\x05\xe0\xc7\x16\xaeG!\xe7\x92\x7fy\xb2\xc5lk\x14<\x98\xf3;.\xdev\x80\xfa\x16\xc6x\f\xbd\xebcs\xdb\xc1i\xa5\xae`\xd4\xafF+\x05\x91\x1f\x12\x14\xc1\xac\xed\xd1)\"\x0e\t\x13\xcfS\b2\xeb\x8c\xd8p\xbex\xeb\xba\xcf\xfb$\x95\xed-\xa9\xed\xceq\xe5\xdd\xce\xee!YI!2\xefT\x1c\x9c\x05\xacF\xfc\x8cG@SC\xf6', 0x2761, 0x0) ioctl$TUNGETSNDBUF(r7, 0x800454d3, &(0x7f0000000600)) recvmsg$kcm(r7, &(0x7f0000000980)={&(0x7f0000000240)=@nl=@proc, 0x80, &(0x7f0000000380)=[{&(0x7f0000000440)=""/211, 0xd3}, {&(0x7f0000000640)=""/141, 0x8d}, {&(0x7f0000000700)=""/138, 0x8a}, {&(0x7f00000007c0)=""/249, 0xf9}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f00000008c0)=""/184, 0xfffffffffffffd6b}], 0x6, &(0x7f0000000140)=""/35, 0x23}, 0x20002100) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000002c0)='memory.events\x00') gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001100)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0x100000, 0x12) [ 2650.465110][ T5670] device nr0 entered promiscuous mode 04:39:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xe) [ 2650.516680][ T5680] FAULT_INJECTION: forcing a failure. [ 2650.516680][ T5680] name failslab, interval 1, probability 0, space 0, times 0 [ 2650.558416][ T5680] CPU: 1 PID: 5680 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 2650.566266][ T5680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2650.576360][ T5680] Call Trace: [ 2650.579665][ T5680] dump_stack+0x172/0x1f0 [ 2650.584010][ T5680] should_fail.cold+0xa/0x15 [ 2650.588617][ T5680] ? fault_create_debugfs_attr+0x180/0x180 [ 2650.594435][ T5680] ? page_to_nid.part.0+0x20/0x20 [ 2650.599468][ T5680] ? ___might_sleep+0x163/0x280 [ 2650.604333][ T5680] __should_failslab+0x121/0x190 [ 2650.609285][ T5680] should_failslab+0x9/0x14 [ 2650.613796][ T5680] kmem_cache_alloc_node_trace+0x274/0x750 [ 2650.619634][ T5680] ? kasan_unpoison_shadow+0x35/0x50 [ 2650.624933][ T5680] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2650.630755][ T5680] __kmalloc_node_track_caller+0x3d/0x70 [ 2650.636400][ T5680] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2650.641786][ T5680] __alloc_skb+0x10b/0x5e0 [ 2650.646203][ T5680] ? netdev_alloc_frag+0x1b0/0x1b0 [ 2650.651323][ T5680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2650.657573][ T5680] ? netlink_autobind.isra.0+0x228/0x310 [ 2650.663212][ T5680] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 2650.669463][ T5680] netlink_sendmsg+0x972/0xd60 [ 2650.674224][ T5680] ? netlink_unicast+0x710/0x710 [ 2650.679154][ T5680] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2650.684681][ T5680] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2650.690125][ T5680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2650.696385][ T5680] ? security_socket_sendmsg+0x8d/0xc0 [ 2650.701825][ T5680] ? netlink_unicast+0x710/0x710 [ 2650.706750][ T5680] sock_sendmsg+0xd7/0x130 [ 2650.711167][ T5680] ___sys_sendmsg+0x803/0x920 [ 2650.715850][ T5680] ? copy_msghdr_from_user+0x440/0x440 [ 2650.721296][ T5680] ? __fget+0xa3/0x560 [ 2650.725350][ T5680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2650.731578][ T5680] ? __fget+0x384/0x560 [ 2650.735718][ T5680] ? ksys_dup3+0x3e0/0x3e0 [ 2650.740119][ T5680] ? __fget_light+0x1a9/0x230 [ 2650.744779][ T5680] ? __fdget+0x1b/0x20 [ 2650.748852][ T5680] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2650.755095][ T5680] __sys_sendmsg+0x105/0x1d0 [ 2650.759672][ T5680] ? __sys_sendmsg_sock+0xd0/0xd0 [ 2650.764686][ T5680] ? switch_fpu_return+0x1fa/0x4f0 [ 2650.769780][ T5680] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2650.775830][ T5680] __x64_sys_sendmsg+0x78/0xb0 [ 2650.780581][ T5680] do_syscall_64+0xfd/0x6a0 [ 2650.785067][ T5680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2650.790944][ T5680] RIP: 0033:0x4598e9 [ 2650.794922][ T5680] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2650.814514][ T5680] RSP: 002b:00007fc3c2e13c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2650.822904][ T5680] RAX: ffffffffffffffda RBX: 00007fc3c2e13c90 RCX: 00000000004598e9 [ 2650.830859][ T5680] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000000000004 [ 2650.838817][ T5680] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2650.846765][ T5680] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc3c2e146d4 [ 2650.854714][ T5680] R13: 00000000004c7777 R14: 00000000004dcfd8 R15: 0000000000000005 04:39:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec4007f2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:39:54 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a0ffffffff}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:54 executing program 5 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x7f, 0x20000000008, 0x3}, 0x3c) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f0000000280)}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002200)={&(0x7f0000001900)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000020c0)=[{&(0x7f0000001980)=""/89, 0x59}, {&(0x7f0000001a00)=""/228, 0xe4}, {&(0x7f0000001b00)=""/72, 0x48}, {&(0x7f0000001b80)=""/146, 0x92}, {&(0x7f0000001c40)=""/87, 0x57}, {&(0x7f0000001cc0)=""/145, 0x91}, {&(0x7f0000001d80)=""/255, 0xff}, {&(0x7f0000001e80)=""/88, 0x58}, {&(0x7f0000001f00)=""/166, 0xa6}, {&(0x7f0000001fc0)=""/206, 0xce}], 0xa, &(0x7f0000002180)=""/93, 0x5d}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002240)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002300)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000070000000000000009000000c573f4ffffffffff850000000b000000850000000600000018140000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000000000f4992385b96c91f3a149883659e287aa4a5a0d57d220e5534aac13cc9eed98935008b68f98a6beb69b7e522ea4767ed1b122dfba57c91bf531f66fde9e815c3ad0961d48d70acb55e00fcf15374e6bbbac2d3b41840bbe5ee4d607fe6d7f4638547894c4669e6467291fccef6b9a1e3db898613f1c7e9aba444426dbbf58cd0fa2da104e113d3d"], &(0x7f00000001c0)='syzkaller\x00', 0x1, 0xd, &(0x7f0000000200)=""/13, 0x41100, 0x0, [], r2, 0x0, r3, 0x8, &(0x7f0000002280)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000022c0)={0x4, 0x9, 0xcf, 0x3}, 0x10}, 0x70) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={0xffffffffffffffff, 0x6, 0x1, 0x8000, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000080), &(0x7f00000000c0)=""/92}, 0x18) 04:39:54 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@ll, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f0000000700)=""/37, 0x25}], 0x5, &(0x7f00000007c0)=""/180, 0xb4}, 0x8060) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89f2, &(0x7f0000000100)={'sit0\x00', @empty=[0x0, 0x0, 0x43]}) r6 = openat$cgroup_ro(r4, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r6, &(0x7f0000003bc0)=ANY=[@ANYBLOB="2b00000020e01bc65375e91cb09adb60b2efb49d6f0142e7cf6b72333eb10d7407519d32fa7668a51ec3c85c2371473527c8eca2665dbd64"], 0xffffffffffffffe0) r7 = socket$kcm(0xa, 0x6, 0x0) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000240)={r5, r8}) 04:39:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xf) [ 2651.192268][ T5697] FAULT_INJECTION: forcing a failure. [ 2651.192268][ T5697] name failslab, interval 1, probability 0, space 0, times 0 04:39:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc80c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00014105000000000000190e000600000000010000000153b4", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2651.236301][ T5697] CPU: 1 PID: 5697 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 2651.244155][ T5697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2651.254215][ T5697] Call Trace: [ 2651.257520][ T5697] dump_stack+0x172/0x1f0 [ 2651.261869][ T5697] should_fail.cold+0xa/0x15 [ 2651.266475][ T5697] ? debug_smp_processor_id+0x3c/0x214 [ 2651.271945][ T5697] ? fault_create_debugfs_attr+0x180/0x180 [ 2651.277776][ T5697] __should_failslab+0x121/0x190 04:39:55 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2651.282705][ T5697] should_failslab+0x9/0x14 [ 2651.287187][ T5697] kmem_cache_alloc+0x47/0x710 [ 2651.291957][ T5697] ? lock_acquire+0x190/0x410 [ 2651.296625][ T5697] ? netlink_deliver_tap+0x146/0xbf0 [ 2651.301901][ T5697] skb_clone+0x154/0x3d0 [ 2651.306148][ T5697] netlink_deliver_tap+0x94d/0xbf0 [ 2651.311269][ T5697] netlink_unicast+0x5a2/0x710 [ 2651.316024][ T5697] ? netlink_attachskb+0x7c0/0x7c0 [ 2651.321141][ T5697] ? _copy_from_iter_full+0x25d/0x8a0 [ 2651.326508][ T5697] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2651.332231][ T5697] ? __check_object_size+0x3d/0x437 [ 2651.337420][ T5697] netlink_sendmsg+0x8a5/0xd60 [ 2651.342182][ T5697] ? netlink_unicast+0x710/0x710 [ 2651.347102][ T5697] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2651.352630][ T5697] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2651.358080][ T5697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2651.364300][ T5697] ? security_socket_sendmsg+0x8d/0xc0 [ 2651.369736][ T5697] ? netlink_unicast+0x710/0x710 [ 2651.374657][ T5697] sock_sendmsg+0xd7/0x130 [ 2651.379056][ T5697] ___sys_sendmsg+0x803/0x920 [ 2651.383714][ T5697] ? copy_msghdr_from_user+0x440/0x440 [ 2651.389158][ T5697] ? __fget+0xa3/0x560 [ 2651.393332][ T5697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2651.399557][ T5697] ? __fget+0x384/0x560 [ 2651.403707][ T5697] ? ksys_dup3+0x3e0/0x3e0 [ 2651.408119][ T5697] ? __fget_light+0x1a9/0x230 [ 2651.412787][ T5697] ? __fdget+0x1b/0x20 [ 2651.416841][ T5697] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2651.423065][ T5697] __sys_sendmsg+0x105/0x1d0 [ 2651.427646][ T5697] ? __sys_sendmsg_sock+0xd0/0xd0 [ 2651.432720][ T5697] ? switch_fpu_return+0x1fa/0x4f0 [ 2651.437873][ T5697] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2651.443940][ T5697] __x64_sys_sendmsg+0x78/0xb0 [ 2651.448689][ T5697] do_syscall_64+0xfd/0x6a0 [ 2651.453177][ T5697] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2651.459133][ T5697] RIP: 0033:0x4598e9 [ 2651.463021][ T5697] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2651.482605][ T5697] RSP: 002b:00007fc3c2e13c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2651.491004][ T5697] RAX: ffffffffffffffda RBX: 00007fc3c2e13c90 RCX: 00000000004598e9 [ 2651.498967][ T5697] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000000000004 [ 2651.506922][ T5697] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2651.514874][ T5697] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc3c2e146d4 [ 2651.522825][ T5697] R13: 00000000004c7777 R14: 00000000004dcfd8 R15: 0000000000000005 04:39:55 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x48) [ 2651.760579][ T5708] device nr0 entered promiscuous mode [ 2651.799055][ T5718] __nla_validate_parse: 14 callbacks suppressed 04:39:55 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2651.799064][ T5718] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2651.839541][ T5720] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:39:55 executing program 5 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc80c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00014105000000000000190e000600000000010000000153b4", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2651.952922][ T5727] FAULT_INJECTION: forcing a failure. [ 2651.952922][ T5727] name failslab, interval 1, probability 0, space 0, times 0 [ 2651.981540][ T5704] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2651.996963][ T5727] CPU: 0 PID: 5727 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 2652.004808][ T5727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2652.014878][ T5727] Call Trace: [ 2652.018184][ T5727] dump_stack+0x172/0x1f0 [ 2652.022551][ T5727] should_fail.cold+0xa/0x15 [ 2652.027163][ T5727] ? fault_create_debugfs_attr+0x180/0x180 [ 2652.027184][ T5727] ? page_to_nid.part.0+0x20/0x20 [ 2652.027208][ T5727] ? ___might_sleep+0x163/0x280 [ 2652.042865][ T5727] __should_failslab+0x121/0x190 [ 2652.047816][ T5727] should_failslab+0x9/0x14 [ 2652.052328][ T5727] kmem_cache_alloc_node+0x268/0x740 [ 2652.057614][ T5727] ? mutex_lock_io_nested+0x1260/0x1260 [ 2652.063146][ T5727] ? lock_acquire+0x190/0x410 [ 2652.067814][ T5727] ? __netlink_dump_start+0x10c/0x7d0 [ 2652.073184][ T5727] __alloc_skb+0xd5/0x5e0 [ 2652.077505][ T5727] ? netdev_alloc_frag+0x1b0/0x1b0 [ 2652.082604][ T5727] ? lock_downgrade+0x920/0x920 [ 2652.087451][ T5727] netlink_dump+0x71f/0xfa0 [ 2652.091946][ T5727] ? netlink_broadcast+0x50/0x50 [ 2652.096891][ T5727] __netlink_dump_start+0x5b1/0x7d0 [ 2652.102075][ T5727] ? genl_lock_dumpit+0x90/0x90 [ 2652.106920][ T5727] genl_family_rcv_msg+0xd5c/0xf90 [ 2652.112028][ T5727] ? genl_unregister_family+0x7b0/0x7b0 [ 2652.117561][ T5727] ? perf_trace_run_bpf_submit+0x131/0x190 [ 2652.123352][ T5727] ? genl_lock_dumpit+0x90/0x90 [ 2652.128197][ T5727] ? genl_lock_done+0xd0/0xd0 [ 2652.132863][ T5727] ? genl_unlock+0x20/0x20 [ 2652.137278][ T5727] ? perf_trace_lock_acquire+0x361/0x530 [ 2652.142897][ T5727] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2652.149126][ T5727] ? __radix_tree_lookup+0x1ef/0x260 [ 2652.154433][ T5727] genl_rcv_msg+0xca/0x170 [ 2652.158842][ T5727] netlink_rcv_skb+0x177/0x450 [ 2652.163596][ T5727] ? genl_family_rcv_msg+0xf90/0xf90 [ 2652.168881][ T5727] ? netlink_ack+0xb30/0xb30 [ 2652.173468][ T5727] ? __kasan_check_write+0x14/0x20 [ 2652.178572][ T5727] ? netlink_deliver_tap+0x254/0xbf0 [ 2652.183853][ T5727] genl_rcv+0x29/0x40 [ 2652.187834][ T5727] netlink_unicast+0x531/0x710 [ 2652.192593][ T5727] ? netlink_attachskb+0x7c0/0x7c0 [ 2652.197702][ T5727] ? _copy_from_iter_full+0x25d/0x8a0 [ 2652.203062][ T5727] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2652.208771][ T5727] ? __check_object_size+0x3d/0x437 [ 2652.213961][ T5727] netlink_sendmsg+0x8a5/0xd60 [ 2652.218722][ T5727] ? netlink_unicast+0x710/0x710 [ 2652.223651][ T5727] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2652.229188][ T5727] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2652.234654][ T5727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2652.240882][ T5727] ? security_socket_sendmsg+0x8d/0xc0 [ 2652.246452][ T5727] ? netlink_unicast+0x710/0x710 [ 2652.251409][ T5727] sock_sendmsg+0xd7/0x130 [ 2652.255836][ T5727] ___sys_sendmsg+0x803/0x920 [ 2652.260511][ T5727] ? copy_msghdr_from_user+0x440/0x440 [ 2652.265968][ T5727] ? __fget+0xa3/0x560 [ 2652.270034][ T5727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2652.276269][ T5727] ? __fget+0x384/0x560 [ 2652.280422][ T5727] ? ksys_dup3+0x3e0/0x3e0 [ 2652.284843][ T5727] ? __fget_light+0x1a9/0x230 [ 2652.289510][ T5727] ? __fdget+0x1b/0x20 [ 2652.293581][ T5727] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2652.299826][ T5727] __sys_sendmsg+0x105/0x1d0 [ 2652.304407][ T5727] ? __sys_sendmsg_sock+0xd0/0xd0 [ 2652.309439][ T5727] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2652.315499][ T5727] __x64_sys_sendmsg+0x78/0xb0 [ 2652.320268][ T5727] do_syscall_64+0xfd/0x6a0 [ 2652.324764][ T5727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2652.330644][ T5727] RIP: 0033:0x4598e9 [ 2652.334538][ T5727] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2652.354144][ T5727] RSP: 002b:00007fc3c2e13c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2652.362570][ T5727] RAX: ffffffffffffffda RBX: 00007fc3c2e13c90 RCX: 00000000004598e9 [ 2652.370556][ T5727] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000000000004 [ 2652.378522][ T5727] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2652.386482][ T5727] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc3c2e146d4 [ 2652.394441][ T5727] R13: 00000000004c7777 R14: 00000000004dcfd8 R15: 0000000000000005 04:39:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400812339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:39:56 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000002c0)='rdma.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)={&(0x7f0000000240)='./file0\x00', r1}, 0x10) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xc1, 0x0}, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x100, 0x10}, 0xc) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r4, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') socket$kcm(0x29, 0x2, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000006c0)=r0, 0x4) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x402002, 0x0) ioctl$TUNSETCARRIER(r6, 0x400454e2, &(0x7f0000000440)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r7, 0x400454d0, 0xb) ioctl$TUNGETVNETHDRSZ(r7, 0x800454d7, &(0x7f0000000480)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00'], 0xfdef) 04:39:56 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x4c) 04:39:56 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:56 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@ll, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f0000000700)=""/37, 0x25}], 0x5, &(0x7f00000007c0)=""/180, 0xb4}, 0x8060) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89f2, &(0x7f0000000100)={'sit0\x00', @empty=[0x0, 0x0, 0x43]}) r6 = openat$cgroup_ro(r4, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r6, &(0x7f0000003bc0)=ANY=[@ANYBLOB="2b00000020e01bc65375e91cb09adb60b2efb49d6f0142e7cf6b72333eb10d7407519d32fa7668a51ec3c85c2371473527c8eca2665dbd64"], 0xffffffffffffffe0) socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=0xffffffffffffffff, 0x4) 04:39:56 executing program 5 (fault-call:3 fault-nth:4): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2652.747601][ T5739] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2652.804627][ T5743] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:39:56 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2653.010799][ T5750] device nr0 entered promiscuous mode [ 2653.028402][ T5751] device nr0 entered promiscuous mode 04:39:56 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2653.226075][ T5746] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2653.251786][ T5749] FAULT_INJECTION: forcing a failure. [ 2653.251786][ T5749] name failslab, interval 1, probability 0, space 0, times 0 [ 2653.274702][ T5749] CPU: 0 PID: 5749 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 2653.282569][ T5749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2653.292700][ T5749] Call Trace: [ 2653.295993][ T5749] dump_stack+0x172/0x1f0 [ 2653.300320][ T5749] should_fail.cold+0xa/0x15 [ 2653.304945][ T5749] ? fault_create_debugfs_attr+0x180/0x180 [ 2653.310864][ T5749] ? page_to_nid.part.0+0x20/0x20 [ 2653.315875][ T5749] ? ___might_sleep+0x163/0x280 [ 2653.320722][ T5749] __should_failslab+0x121/0x190 [ 2653.325645][ T5749] should_failslab+0x9/0x14 [ 2653.330171][ T5749] kmem_cache_alloc_node_trace+0x274/0x750 [ 2653.335958][ T5749] ? kasan_unpoison_shadow+0x35/0x50 [ 2653.341345][ T5749] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2653.347152][ T5749] __kmalloc_node_track_caller+0x3d/0x70 [ 2653.352782][ T5749] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2653.358146][ T5749] __alloc_skb+0x10b/0x5e0 [ 2653.362552][ T5749] ? netdev_alloc_frag+0x1b0/0x1b0 [ 2653.367650][ T5749] ? lock_downgrade+0x920/0x920 [ 2653.372491][ T5749] netlink_dump+0x71f/0xfa0 [ 2653.377151][ T5749] ? netlink_broadcast+0x50/0x50 [ 2653.382095][ T5749] __netlink_dump_start+0x5b1/0x7d0 [ 2653.387424][ T5749] ? genl_lock_dumpit+0x90/0x90 [ 2653.392314][ T5749] genl_family_rcv_msg+0xd5c/0xf90 [ 2653.397419][ T5749] ? genl_unregister_family+0x7b0/0x7b0 [ 2653.402998][ T5749] ? perf_trace_run_bpf_submit+0x131/0x190 [ 2653.408785][ T5749] ? genl_lock_dumpit+0x90/0x90 [ 2653.413613][ T5749] ? genl_lock_done+0xd0/0xd0 [ 2653.418281][ T5749] ? genl_unlock+0x20/0x20 [ 2653.422699][ T5749] genl_rcv_msg+0xca/0x170 [ 2653.427195][ T5749] netlink_rcv_skb+0x177/0x450 [ 2653.431944][ T5749] ? genl_family_rcv_msg+0xf90/0xf90 [ 2653.437212][ T5749] ? netlink_ack+0xb30/0xb30 [ 2653.441784][ T5749] ? __kasan_check_write+0x14/0x20 [ 2653.446881][ T5749] ? netlink_deliver_tap+0x254/0xbf0 [ 2653.452152][ T5749] genl_rcv+0x29/0x40 [ 2653.456147][ T5749] netlink_unicast+0x531/0x710 [ 2653.460902][ T5749] ? netlink_attachskb+0x7c0/0x7c0 [ 2653.465998][ T5749] ? _copy_from_iter_full+0x25d/0x8a0 [ 2653.471357][ T5749] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2653.477062][ T5749] ? __check_object_size+0x3d/0x437 [ 2653.482249][ T5749] netlink_sendmsg+0x8a5/0xd60 [ 2653.487000][ T5749] ? netlink_unicast+0x710/0x710 [ 2653.491919][ T5749] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2653.497444][ T5749] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2653.502995][ T5749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2653.509215][ T5749] ? security_socket_sendmsg+0x8d/0xc0 [ 2653.514653][ T5749] ? netlink_unicast+0x710/0x710 [ 2653.519574][ T5749] sock_sendmsg+0xd7/0x130 [ 2653.523970][ T5749] ___sys_sendmsg+0x803/0x920 [ 2653.528631][ T5749] ? copy_msghdr_from_user+0x440/0x440 [ 2653.534073][ T5749] ? __fget+0xa3/0x560 [ 2653.538143][ T5749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2653.544379][ T5749] ? __fget+0x384/0x560 [ 2653.548525][ T5749] ? ksys_dup3+0x3e0/0x3e0 [ 2653.552932][ T5749] ? __fget_light+0x1a9/0x230 [ 2653.557590][ T5749] ? __fdget+0x1b/0x20 [ 2653.561654][ T5749] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2653.567942][ T5749] __sys_sendmsg+0x105/0x1d0 [ 2653.572534][ T5749] ? __sys_sendmsg_sock+0xd0/0xd0 [ 2653.577602][ T5749] ? switch_fpu_return+0x1fa/0x4f0 [ 2653.582737][ T5749] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2653.588825][ T5749] __x64_sys_sendmsg+0x78/0xb0 [ 2653.593610][ T5749] do_syscall_64+0xfd/0x6a0 [ 2653.598119][ T5749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2653.604000][ T5749] RIP: 0033:0x4598e9 [ 2653.607905][ T5749] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:39:57 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x60) [ 2653.627529][ T5749] RSP: 002b:00007fc3c2e13c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2653.635938][ T5749] RAX: ffffffffffffffda RBX: 00007fc3c2e13c90 RCX: 00000000004598e9 [ 2653.643913][ T5749] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000000000004 [ 2653.651877][ T5749] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2653.659838][ T5749] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc3c2e146d4 [ 2653.667797][ T5749] R13: 00000000004c7777 R14: 00000000004dcfd8 R15: 0000000000000005 04:39:57 executing program 5 (fault-call:3 fault-nth:5): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2653.767427][ T5747] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:39:57 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0ffffffff}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:57 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@ll, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f0000000700)=""/37, 0x25}], 0x5, &(0x7f00000007c0)=""/180, 0xb4}, 0x8060) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89f2, &(0x7f0000000100)={'sit0\x00', @empty=[0x0, 0x0, 0x43]}) r6 = openat$cgroup_ro(r4, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r6, &(0x7f0000003bc0)=ANY=[@ANYBLOB="2b00000020e01bc65375e91cb09adb60b2efb49d6f0142e7cf6b72333eb10d7407519d32fa7668a51ec3c85c2371473527c8eca2665dbd64"], 0xffffffffffffffe0) socket$kcm(0xa, 0x6, 0x0) [ 2654.033128][ T5763] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2654.052329][ T5767] FAULT_INJECTION: forcing a failure. [ 2654.052329][ T5767] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2654.065564][ T5767] CPU: 1 PID: 5767 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 2654.073366][ T5767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 04:39:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400822339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) [ 2654.080217][ T5763] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2654.083415][ T5767] Call Trace: [ 2654.083439][ T5767] dump_stack+0x172/0x1f0 [ 2654.083463][ T5767] should_fail.cold+0xa/0x15 [ 2654.104897][ T5767] ? fault_create_debugfs_attr+0x180/0x180 [ 2654.110710][ T5767] ? save_stack+0x5c/0x90 [ 2654.115045][ T5767] ? save_stack+0x23/0x90 [ 2654.119367][ T5767] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2654.119379][ T5767] ? kasan_slab_alloc+0xf/0x20 [ 2654.119390][ T5767] ? kmem_cache_alloc_node+0x138/0x740 [ 2654.119410][ T5767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2654.141625][ T5767] should_fail_alloc_page+0x50/0x60 [ 2654.141639][ T5767] __alloc_pages_nodemask+0x1a1/0x900 [ 2654.141658][ T5767] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2654.157922][ T5767] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2654.163590][ T5767] ? __kasan_check_read+0x11/0x20 [ 2654.168641][ T5767] ? fault_create_debugfs_attr+0x180/0x180 [ 2654.174461][ T5767] cache_grow_begin+0x90/0xd20 [ 2654.179228][ T5767] ? __kmalloc_node_track_caller+0x3d/0x70 [ 2654.179243][ T5767] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2654.179258][ T5767] kmem_cache_alloc_node_trace+0x689/0x750 [ 2654.179276][ T5767] ? kasan_unpoison_shadow+0x35/0x50 [ 2654.202373][ T5767] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2654.208195][ T5767] __kmalloc_node_track_caller+0x3d/0x70 [ 2654.213844][ T5767] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2654.213867][ T5767] __alloc_skb+0x10b/0x5e0 [ 2654.223636][ T5767] ? netdev_alloc_frag+0x1b0/0x1b0 [ 2654.228748][ T5767] ? lock_downgrade+0x920/0x920 [ 2654.228770][ T5767] netlink_dump+0x71f/0xfa0 [ 2654.228787][ T5767] ? netlink_broadcast+0x50/0x50 [ 2654.228811][ T5767] __netlink_dump_start+0x5b1/0x7d0 [ 2654.248251][ T5767] ? genl_lock_dumpit+0x90/0x90 [ 2654.248270][ T5767] genl_family_rcv_msg+0xd5c/0xf90 [ 2654.248290][ T5767] ? genl_unregister_family+0x7b0/0x7b0 [ 2654.248302][ T5767] ? genl_lock_dumpit+0x90/0x90 [ 2654.248311][ T5767] ? genl_lock_done+0xd0/0xd0 [ 2654.248327][ T5767] ? genl_unlock+0x20/0x20 [ 2654.254038][ T5776] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2654.258260][ T5767] ? debug_smp_processor_id+0x3c/0x214 [ 2654.258290][ T5767] genl_rcv_msg+0xca/0x170 [ 2654.258314][ T5767] netlink_rcv_skb+0x177/0x450 [ 2654.268671][ T5767] ? genl_family_rcv_msg+0xf90/0xf90 [ 2654.268687][ T5767] ? netlink_ack+0xb30/0xb30 [ 2654.268701][ T5767] ? __kasan_check_write+0x14/0x20 [ 2654.268718][ T5767] ? netlink_deliver_tap+0x254/0xbf0 [ 2654.277772][ T5767] genl_rcv+0x29/0x40 [ 2654.277787][ T5767] netlink_unicast+0x531/0x710 [ 2654.277809][ T5767] ? netlink_attachskb+0x7c0/0x7c0 [ 2654.292618][ T5767] ? _copy_from_iter_full+0x25d/0x8a0 [ 2654.292638][ T5767] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2654.292653][ T5767] ? __check_object_size+0x3d/0x437 [ 2654.292672][ T5767] netlink_sendmsg+0x8a5/0xd60 [ 2654.292690][ T5767] ? netlink_unicast+0x710/0x710 [ 2654.292710][ T5767] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2654.301859][ T5767] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2654.301878][ T5767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2654.301896][ T5767] ? security_socket_sendmsg+0x8d/0xc0 [ 2654.311730][ T5767] ? netlink_unicast+0x710/0x710 [ 2654.311746][ T5767] sock_sendmsg+0xd7/0x130 [ 2654.311761][ T5767] ___sys_sendmsg+0x803/0x920 [ 2654.311779][ T5767] ? copy_msghdr_from_user+0x440/0x440 [ 2654.311798][ T5767] ? __fget+0xa3/0x560 [ 2654.311817][ T5767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2654.326148][ T5767] ? __fget+0x384/0x560 [ 2654.326165][ T5767] ? ksys_dup3+0x3e0/0x3e0 [ 2654.326185][ T5767] ? __fget_light+0x1a9/0x230 [ 2654.336017][ T5767] ? __fdget+0x1b/0x20 [ 2654.336040][ T5767] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2654.336065][ T5767] __sys_sendmsg+0x105/0x1d0 [ 2654.442298][ T5767] ? __sys_sendmsg_sock+0xd0/0xd0 [ 2654.447314][ T5767] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2654.453392][ T5767] __x64_sys_sendmsg+0x78/0xb0 [ 2654.458168][ T5767] do_syscall_64+0xfd/0x6a0 [ 2654.462684][ T5767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2654.468562][ T5767] RIP: 0033:0x4598e9 [ 2654.472442][ T5767] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2654.492042][ T5767] RSP: 002b:00007fc3c2df2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2654.500435][ T5767] RAX: ffffffffffffffda RBX: 00007fc3c2df2c90 RCX: 00000000004598e9 [ 2654.508387][ T5767] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000000000004 [ 2654.516351][ T5767] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2654.524302][ T5767] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc3c2df36d4 [ 2654.532256][ T5767] R13: 00000000004c7777 R14: 00000000004dcfd8 R15: 0000000000000005 04:39:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000440)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f0000000100)=""/25}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000300)="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", &(0x7f0000000000)=""/95}, 0x18) 04:39:58 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001a0ffffffff}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x68) 04:39:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2654.740892][ T5782] device nr0 entered promiscuous mode 04:39:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000440)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f0000000100)=""/25}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000300)="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", &(0x7f0000000000)=""/95}, 0x18) 04:39:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400832339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:39:58 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000440)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f0000000100)=""/25}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000300)="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", &(0x7f0000000000)=""/95}, 0x18) 04:39:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x6c) 04:39:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:58 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@ll, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f0000000700)=""/37, 0x25}], 0x5, &(0x7f00000007c0)=""/180, 0xb4}, 0x8060) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89f2, &(0x7f0000000100)={'sit0\x00', @empty=[0x0, 0x0, 0x43]}) r6 = openat$cgroup_ro(r4, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r6, &(0x7f0000003bc0)=ANY=[@ANYBLOB="2b00000020e01bc65375e91cb09adb60b2efb49d6f0142e7cf6b72333eb10d7407519d32fa7668a51ec3c85c2371473527c8eca2665dbd64"], 0xffffffffffffffe0) 04:39:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000440)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f0000000100)=""/25}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000300)="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", &(0x7f0000000000)=""/95}, 0x18) 04:39:59 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:59 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x9, 0x3f, 0x7994, 0x0, 0x4e17, 0x40, 0x5, 0x9, 0x5, 0x18, 0x80, 0x7, 0x0, 0x0, 0xb788, 0x5, 0x0, 0x3, 0x6968, 0x9, 0x100000001, 0x1000, 0x1b, 0xa, 0x800, 0x8, 0x6c00000000000, 0x3, 0x5, 0x6, 0x4, 0x3ff, 0x3bb1, 0x9, 0x10001, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8, 0x0, 0x10000000000, 0xd, 0x0, 0x1ff}, 0x0, 0x2, r0, 0x2) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f00000004c0)='syz0\x00', 0x1ff) socketpair(0x0, 0x8000, 0x1000, 0x0) r2 = getpid() r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='\x00'/14, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r3, &(0x7f0000000580)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000005c0)=r2, 0x12) r6 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x4000, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="90b698f3a995a2cb5425e4edbc1b64ab0f3fd8e458b06224d9389b495b93de2813d97be03fd016aedb51dcfc65285a655361e572417faa7164087e95ae813387", 0x40}, {&(0x7f0000000640)="767651a641e92f1e1d1ddf657366135f923d9df3414a7a530963972cbb9b6f6f6cfe7394f15524d7cc3a12ff060553f5c73d445279b1ae4ff70f255bfadec5192ddfb6e4ef406bc7de369c213a412ea15e0616ce8b168f28aaae07e1d8c8cc77eb7de9683cc61bde97b085d8d1a0011da893c8ead3ef13d747ca8c8d39be147a889182c410c9fc91f5c069be21e460b9", 0x90}, {&(0x7f0000000740)="d008f951037ad8c4e6f4ca6170e6c05169b3c794a9650247b38be5baed13e19da76f6db22053b7568fd42f713b3c993141deba377ba4ef5a95ba426d271374c05d157e13ae57c193ff09b48c4525bbd9283bb738436873ef0406053cac210884c5f56f9071b690fca74bc7aff162a9e6a06509fd0ecbf363c6017e9ef8adc2a653f22f9f2f9256cd479a2835377a626e31f960bbfb74311eadff9c7dda939bbfc77a0f3c0f8053d1549569331afb5fbd8528ccd5", 0xb4}], 0x3}, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00', r5}, 0x10) r7 = openat$cgroup_ro(r4, &(0x7f0000000600)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xffffffffffffffff, 0x1, 0x400, 0x1c1, 0xffffffffffffffff, 0x1, [], 0x0, r7, 0x3}, 0x19d) write$cgroup_pid(r7, &(0x7f0000000540)=r2, 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_int(r4, &(0x7f0000000140)='cpuset.cpu_exclusive\x00', 0x2, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000240)={'caif0\x00', @random="a2de5962a2b1"}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r9 = gettid() gettid() write$cgroup_pid(r8, &(0x7f0000000400)=r9, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x6, 0x1, 0x8001, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) openat$cgroup_procs(r8, &(0x7f0000000500)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) socket$kcm(0x2b, 0x1, 0x0) [ 2655.380676][ T5822] device nr0 entered promiscuous mode 04:39:59 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x9, 0x3f, 0x7994, 0x0, 0x4e17, 0x40, 0x5, 0x9, 0x5, 0x18, 0x80, 0x7, 0x0, 0x0, 0xb788, 0x5, 0x0, 0x3, 0x6968, 0x9, 0x100000001, 0x1000, 0x1b, 0xa, 0x800, 0x8, 0x6c00000000000, 0x3, 0x5, 0x6, 0x4, 0x3ff, 0x3bb1, 0x9, 0x10001, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8, 0x0, 0x10000000000, 0xd, 0x0, 0x1ff}, 0x0, 0x2, r0, 0x2) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f00000004c0)='syz0\x00', 0x1ff) socketpair(0x0, 0x8000, 0x1000, 0x0) r2 = getpid() r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='\x00'/14, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r3, &(0x7f0000000580)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000005c0)=r2, 0x12) r6 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x4000, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="90b698f3a995a2cb5425e4edbc1b64ab0f3fd8e458b06224d9389b495b93de2813d97be03fd016aedb51dcfc65285a655361e572417faa7164087e95ae813387", 0x40}, {&(0x7f0000000640)="767651a641e92f1e1d1ddf657366135f923d9df3414a7a530963972cbb9b6f6f6cfe7394f15524d7cc3a12ff060553f5c73d445279b1ae4ff70f255bfadec5192ddfb6e4ef406bc7de369c213a412ea15e0616ce8b168f28aaae07e1d8c8cc77eb7de9683cc61bde97b085d8d1a0011da893c8ead3ef13d747ca8c8d39be147a889182c410c9fc91f5c069be21e460b9", 0x90}, {&(0x7f0000000740)="d008f951037ad8c4e6f4ca6170e6c05169b3c794a9650247b38be5baed13e19da76f6db22053b7568fd42f713b3c993141deba377ba4ef5a95ba426d271374c05d157e13ae57c193ff09b48c4525bbd9283bb738436873ef0406053cac210884c5f56f9071b690fca74bc7aff162a9e6a06509fd0ecbf363c6017e9ef8adc2a653f22f9f2f9256cd479a2835377a626e31f960bbfb74311eadff9c7dda939bbfc77a0f3c0f8053d1549569331afb5fbd8528ccd5", 0xb4}], 0x3}, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00', r5}, 0x10) r7 = openat$cgroup_ro(r4, &(0x7f0000000600)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xffffffffffffffff, 0x1, 0x400, 0x1c1, 0xffffffffffffffff, 0x1, [], 0x0, r7, 0x3}, 0x19d) write$cgroup_pid(r7, &(0x7f0000000540)=r2, 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_int(r4, &(0x7f0000000140)='cpuset.cpu_exclusive\x00', 0x2, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000240)={'caif0\x00', @random="a2de5962a2b1"}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r9 = gettid() gettid() write$cgroup_pid(r8, &(0x7f0000000400)=r9, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x6, 0x1, 0x8001, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) openat$cgroup_procs(r8, &(0x7f0000000500)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) socket$kcm(0x2b, 0x1, 0x0) 04:39:59 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:59 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x74) 04:39:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400842339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:39:59 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@ll, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f0000000700)=""/37, 0x25}], 0x5, &(0x7f00000007c0)=""/180, 0xb4}, 0x8060) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89f2, &(0x7f0000000100)={'sit0\x00', @empty=[0x0, 0x0, 0x43]}) openat$cgroup_ro(r4, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) 04:39:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:39:59 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:59 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x9, 0x3f, 0x7994, 0x0, 0x4e17, 0x40, 0x5, 0x9, 0x5, 0x18, 0x80, 0x7, 0x0, 0x0, 0xb788, 0x5, 0x0, 0x3, 0x6968, 0x9, 0x100000001, 0x1000, 0x1b, 0xa, 0x800, 0x8, 0x6c00000000000, 0x3, 0x5, 0x6, 0x4, 0x3ff, 0x3bb1, 0x9, 0x10001, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8, 0x0, 0x10000000000, 0xd, 0x0, 0x1ff}, 0x0, 0x2, r0, 0x2) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f00000004c0)='syz0\x00', 0x1ff) socketpair(0x0, 0x8000, 0x1000, 0x0) r2 = getpid() r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='\x00'/14, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r3, &(0x7f0000000580)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000005c0)=r2, 0x12) r6 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x4000, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="90b698f3a995a2cb5425e4edbc1b64ab0f3fd8e458b06224d9389b495b93de2813d97be03fd016aedb51dcfc65285a655361e572417faa7164087e95ae813387", 0x40}, {&(0x7f0000000640)="767651a641e92f1e1d1ddf657366135f923d9df3414a7a530963972cbb9b6f6f6cfe7394f15524d7cc3a12ff060553f5c73d445279b1ae4ff70f255bfadec5192ddfb6e4ef406bc7de369c213a412ea15e0616ce8b168f28aaae07e1d8c8cc77eb7de9683cc61bde97b085d8d1a0011da893c8ead3ef13d747ca8c8d39be147a889182c410c9fc91f5c069be21e460b9", 0x90}, {&(0x7f0000000740)="d008f951037ad8c4e6f4ca6170e6c05169b3c794a9650247b38be5baed13e19da76f6db22053b7568fd42f713b3c993141deba377ba4ef5a95ba426d271374c05d157e13ae57c193ff09b48c4525bbd9283bb738436873ef0406053cac210884c5f56f9071b690fca74bc7aff162a9e6a06509fd0ecbf363c6017e9ef8adc2a653f22f9f2f9256cd479a2835377a626e31f960bbfb74311eadff9c7dda939bbfc77a0f3c0f8053d1549569331afb5fbd8528ccd5", 0xb4}], 0x3}, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00', r5}, 0x10) r7 = openat$cgroup_ro(r4, &(0x7f0000000600)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xffffffffffffffff, 0x1, 0x400, 0x1c1, 0xffffffffffffffff, 0x1, [], 0x0, r7, 0x3}, 0x19d) write$cgroup_pid(r7, &(0x7f0000000540)=r2, 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_int(r4, &(0x7f0000000140)='cpuset.cpu_exclusive\x00', 0x2, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000240)={'caif0\x00', @random="a2de5962a2b1"}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r9 = gettid() gettid() write$cgroup_pid(r8, &(0x7f0000000400)=r9, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x6, 0x1, 0x8001, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) openat$cgroup_procs(r8, &(0x7f0000000500)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) socket$kcm(0x2b, 0x1, 0x0) 04:39:59 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x7a) 04:39:59 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:39:59 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x9, 0x3f, 0x7994, 0x0, 0x4e17, 0x40, 0x5, 0x9, 0x5, 0x18, 0x80, 0x7, 0x0, 0x0, 0xb788, 0x5, 0x0, 0x3, 0x6968, 0x9, 0x100000001, 0x1000, 0x1b, 0xa, 0x800, 0x8, 0x6c00000000000, 0x3, 0x5, 0x6, 0x4, 0x3ff, 0x3bb1, 0x9, 0x10001, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8, 0x0, 0x10000000000, 0xd, 0x0, 0x1ff}, 0x0, 0x2, r0, 0x2) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f00000004c0)='syz0\x00', 0x1ff) socketpair(0x0, 0x8000, 0x1000, 0x0) r2 = getpid() r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='\x00'/14, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r3, &(0x7f0000000580)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000005c0)=r2, 0x12) r6 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x4000, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="90b698f3a995a2cb5425e4edbc1b64ab0f3fd8e458b06224d9389b495b93de2813d97be03fd016aedb51dcfc65285a655361e572417faa7164087e95ae813387", 0x40}, {&(0x7f0000000640)="767651a641e92f1e1d1ddf657366135f923d9df3414a7a530963972cbb9b6f6f6cfe7394f15524d7cc3a12ff060553f5c73d445279b1ae4ff70f255bfadec5192ddfb6e4ef406bc7de369c213a412ea15e0616ce8b168f28aaae07e1d8c8cc77eb7de9683cc61bde97b085d8d1a0011da893c8ead3ef13d747ca8c8d39be147a889182c410c9fc91f5c069be21e460b9", 0x90}, {&(0x7f0000000740)="d008f951037ad8c4e6f4ca6170e6c05169b3c794a9650247b38be5baed13e19da76f6db22053b7568fd42f713b3c993141deba377ba4ef5a95ba426d271374c05d157e13ae57c193ff09b48c4525bbd9283bb738436873ef0406053cac210884c5f56f9071b690fca74bc7aff162a9e6a06509fd0ecbf363c6017e9ef8adc2a653f22f9f2f9256cd479a2835377a626e31f960bbfb74311eadff9c7dda939bbfc77a0f3c0f8053d1549569331afb5fbd8528ccd5", 0xb4}], 0x3}, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00', r5}, 0x10) r7 = openat$cgroup_ro(r4, &(0x7f0000000600)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xffffffffffffffff, 0x1, 0x400, 0x1c1, 0xffffffffffffffff, 0x1, [], 0x0, r7, 0x3}, 0x19d) write$cgroup_pid(r7, &(0x7f0000000540)=r2, 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_int(r4, &(0x7f0000000140)='cpuset.cpu_exclusive\x00', 0x2, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000240)={'caif0\x00', @random="a2de5962a2b1"}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r9 = gettid() gettid() write$cgroup_pid(r8, &(0x7f0000000400)=r9, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x6, 0x1, 0x8001, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) openat$cgroup_procs(r8, &(0x7f0000000500)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) socket$kcm(0x2b, 0x1, 0x0) 04:39:59 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x9, 0x3f, 0x7994, 0x0, 0x4e17, 0x40, 0x5, 0x9, 0x5, 0x18, 0x80, 0x7, 0x0, 0x0, 0xb788, 0x5, 0x0, 0x3, 0x6968, 0x9, 0x100000001, 0x1000, 0x1b, 0xa, 0x800, 0x8, 0x6c00000000000, 0x3, 0x5, 0x6, 0x4, 0x3ff, 0x3bb1, 0x9, 0x10001, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8, 0x0, 0x10000000000, 0xd, 0x0, 0x1ff}, 0x0, 0x2, r0, 0x2) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f00000004c0)='syz0\x00', 0x1ff) socketpair(0x0, 0x8000, 0x1000, 0x0) r2 = getpid() r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='\x00'/14, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r3, &(0x7f0000000580)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000005c0)=r2, 0x12) r6 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x4000, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="90b698f3a995a2cb5425e4edbc1b64ab0f3fd8e458b06224d9389b495b93de2813d97be03fd016aedb51dcfc65285a655361e572417faa7164087e95ae813387", 0x40}, {&(0x7f0000000640)="767651a641e92f1e1d1ddf657366135f923d9df3414a7a530963972cbb9b6f6f6cfe7394f15524d7cc3a12ff060553f5c73d445279b1ae4ff70f255bfadec5192ddfb6e4ef406bc7de369c213a412ea15e0616ce8b168f28aaae07e1d8c8cc77eb7de9683cc61bde97b085d8d1a0011da893c8ead3ef13d747ca8c8d39be147a889182c410c9fc91f5c069be21e460b9", 0x90}, {&(0x7f0000000740)="d008f951037ad8c4e6f4ca6170e6c05169b3c794a9650247b38be5baed13e19da76f6db22053b7568fd42f713b3c993141deba377ba4ef5a95ba426d271374c05d157e13ae57c193ff09b48c4525bbd9283bb738436873ef0406053cac210884c5f56f9071b690fca74bc7aff162a9e6a06509fd0ecbf363c6017e9ef8adc2a653f22f9f2f9256cd479a2835377a626e31f960bbfb74311eadff9c7dda939bbfc77a0f3c0f8053d1549569331afb5fbd8528ccd5", 0xb4}], 0x3}, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00', r5}, 0x10) r7 = openat$cgroup_ro(r4, &(0x7f0000000600)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xffffffffffffffff, 0x1, 0x400, 0x1c1, 0xffffffffffffffff, 0x1, [], 0x0, r7, 0x3}, 0x19d) write$cgroup_pid(r7, &(0x7f0000000540)=r2, 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_int(r4, &(0x7f0000000140)='cpuset.cpu_exclusive\x00', 0x2, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000240)={'caif0\x00', @random="a2de5962a2b1"}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r9 = gettid() gettid() write$cgroup_pid(r8, &(0x7f0000000400)=r9, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x6, 0x1, 0x8001, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) openat$cgroup_procs(r8, &(0x7f0000000500)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) socket$kcm(0x2b, 0x1, 0x0) 04:40:00 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2656.242899][ T5860] device nr0 entered promiscuous mode 04:40:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x3}]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x1}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) close(r0) 04:40:00 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000000)="86eaf98e547ba6607e8a1a9f9aba8023577f8b36669bde790fd2c1aa548fb22e47f8e4d80d5d0defb0fc83e43e15f178772c9ee70a7881938b54e1c1bc02f450a41bfbbf03c4f00bc145ac93aac0cb9675b65d022dd799151768e0966d9cc5df308028c96109091ba8804ba9ec3d47b7096b6fe31e685421902e6a2426f2090c96db214429b10d02c286669dbe8313622dc8a6d3a14bc19ca00cf41bbbab3cd734b32a3fb4cced1ca177af931a807a250b0bf72b92e2c2dd44c968ccd707eea2b280d31eae59", 0xc6}, {&(0x7f0000000200)="b209e5cf09563b2f061ff8c30afbbb3f09ba3ba3be923a927c3069f81c51e71ba98e92927e5fff66c8bc7695e26e31a3fe5ec8e55fe1a20fe436a45168c8f7cd387ee1ed81e23557164fea89fa3ac874e12a7cf30c66db9892151c70eace8ec2bd722df7bc641595f3064dc8fc8dee8c5e0c41b22f2cbfa6da742c47b9ac833f4df09d4578db54ffed30884e25783ec7777dcfd12093331ebc0f001b80a375032e779696c14903a7b68a1fdaa9876d7a0cdd1fcf0a8bc66fc3b6f3", 0xbb}, {&(0x7f00000002c0)="6fa345fe1cdd85013e97e50d63aa70c0bf54d992d4389119b41e28385fd845f0925207d2c12c319fd5f6464b4751c4298f7f18397551316df9404127c7370a31bd6a6512fde4c27dc8646093b1dcac0f7d00f59e2a3c73c200927c17eb19aef62d9144ce325cf53d55d3db083b51bc43989ef30b2600a3d3025faff7ad0587fbbb23bd58f0e4f4c0e563968c9f9294d8052a19bd246734d59595bfc43e24fdc7707bce6d3bc144bb3221b5fdaf91667a0ba4", 0xb2}, {&(0x7f0000000380)="ea4b4a4921eac31af462a4ea3b7629701d2ce080ce0beeef3b2bf242efcaf7732da43f623ef97b8403f585f6c8e21617895144eab2aaf2759bfafab348c4d9cc2549ef91fb8b8e977de898386afdf11c35c18302f30dabc06caec43dc38407bb1fd2d6a65993a410289a7c8104006d3c9403278f6a7c2a6637725a07fb339d3f5e", 0x81}, {&(0x7f0000000440)="561e10ad515bdfd110cbc126b298e97665b024452f8c2bc1ecd58a38efeece13a486a5bd62eaaed10366935dad50d5f0c9394fb936da4a9639865f8add98cc7208fd1abd083fd9e50f4e8625a67ac8df0e57db8a90c8643f858c8a2ff8d397726636b43af989de94b833ff8c2dbe6f049cb4b8884820b90679350a10fa547e4eaf511ff6cce24d95b5320b5200494bb011de6058fc629448e9993f0fcfffceef6405b040570322bf7a6eace4f50fd997788ee3057f3ebdf9d7f35e0924f02ddc7dc8c6635f6a88bd70baf1d0888a5e", 0x1bd}, {&(0x7f0000000140)="d957", 0x2}, {&(0x7f00000006c0)="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", 0x192}], 0x7}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x4c, 0xffffffffffffffbd) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f00000001c0)='veth0\x00') recvmsg(r2, &(0x7f0000000a00)={&(0x7f0000000540)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000000180)=[{&(0x7f00000005c0)=""/127, 0x7f}, {&(0x7f0000000880)=""/214, 0xd6}, {&(0x7f0000000980)=""/126, 0x7e}], 0x3}, 0x10000) 04:40:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400852339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:00 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xf0) 04:40:00 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@ll, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f0000000700)=""/37, 0x25}], 0x5, &(0x7f00000007c0)=""/180, 0xb4}, 0x8060) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x89f2, &(0x7f0000000100)={'sit0\x00', @empty=[0x0, 0x0, 0x43]}) 04:40:00 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x29f) [ 2656.829837][ T5888] device nr0 entered promiscuous mode [ 2656.843406][ T5896] __nla_validate_parse: 13 callbacks suppressed [ 2656.843416][ T5896] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2656.869083][ T5897] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:00 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x300) 04:40:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xe, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2657.149697][ T5911] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2657.185020][ T5913] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:00 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2657.293435][ T5893] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:01 executing program 4: r0 = socket$kcm(0x29, 0xffffdffffffffffd, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x4, 0x8, 0x100}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f0000000200)="f21c", 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000280)='cpB1\x82\x12,\xf8\x18\x11c\x17\v\x95\xdc\xa3\x18b\xbeV\x18\r\xe0Zt\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000340)='cp\xaf#\x8b\xa6\x12\xb9\x81\xc8\xe4\x1c\xc4\n+\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000580)=0x7, 0x12) r6 = openat$cgroup_ro(r2, &(0x7f0000000480)='pids.events\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000100)={r5}) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x3b, &(0x7f0000000b80)=ANY=[@ANYBLOB="7ba8f8c81ba657e37300000000000000f4de344dd93d3035cd88c75cb3ef0892e6313fe283071a37ce106bb1cf7fc30c9c8bda2ef9cd886c7c1315729b34f8ced91549c4dbcd026ff7cf02901671beee07659cd458ad168e023e97537c91071797507107d300191114521f676a080000000000000072c2e72dbb079ee600b4835d6c99d4525ccde1fc95304908928bee89cb875c20698066d27d53e1bf6339066bc77548c64428e6bf32b6828d9b5c981e5f4e20ae903650d12c43c182e7458c04b5e113a717032d7807ed0080000000000000eb9730c922273dfcfbb18331e4df2fbdac4009df3c90ef194eea212e5f951c75d9fed156a1c4b3c3be788ec3846beba30bb2da91e2bb1566c132b82a02e508a3147afefe5a2dbbd9b29c04593122e44fc7d6c817e39cf962a05c3dd191bcaf54f5240d4a94abb26ddb6d73acfea7a4d666019f8b11dcccc4d71cf8cc951ac2d714766433dc5ed3d7ebf77dc6a44bab64308975b8d10ed945737fb6a0c3faff05f36a1fb8fd90d9e0238d7d5082e95e437f08efbb14cef872e8975c96721d564b50ba35a590f1856f82c083eb795030906b269539512e51084796546c49843fabc53640900e776b41c2256f2d76d8ce84c66c6739b1f4664f763db7f0000000007b33d6b9766b1c3aeac6419ff48767117e3f2bb7951bb45c300a923cec8286a40c4efcc56e629207d139681c0cabffb6a4fe57e74343c8306f4d752d49add67e0c691a33cf8157babfc9ea7d2a4a2a1d279536d0cea0e8b081714f"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x2}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) r7 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x800, 0x20000000, @perf_config_ext, 0x1411, 0xc92, 0x3e}, r7, 0x3, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000140)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000540)='./file0\x00', 0x0, 0x8}, 0xffffffffffffffca) close(r1) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)={r6}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNSETVNETLE(r8, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x0, &(0x7f0000000780)=ANY=[], 0x0}, 0x48) close(r9) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r10, &(0x7f00000000c0), 0xffffff19) 04:40:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400862339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:01 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x3a0) 04:40:01 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe02000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:01 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@ll, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f0000000700)=""/37, 0x25}], 0x5, &(0x7f00000007c0)=""/180, 0xb4}, 0x8060) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x2, 0x0) 04:40:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xf, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2657.605699][ T5941] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2657.633342][ T5942] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:01 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x500) 04:40:01 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2657.763547][ T5929] device nr0 entered promiscuous mode 04:40:01 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2657.918326][ T5948] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x60, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:01 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10c3080000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2657.970671][ T5951] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:01 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x600) [ 2658.084266][ T5935] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:02 executing program 4: r0 = socket$kcm(0x29, 0xffffdffffffffffd, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x4, 0x8, 0x100}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f0000000200)="f21c", 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000280)='cpB1\x82\x12,\xf8\x18\x11c\x17\v\x95\xdc\xa3\x18b\xbeV\x18\r\xe0Zt\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000340)='cp\xaf#\x8b\xa6\x12\xb9\x81\xc8\xe4\x1c\xc4\n+\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000580)=0x7, 0x12) r6 = openat$cgroup_ro(r2, &(0x7f0000000480)='pids.events\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000100)={r5}) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x3b, &(0x7f0000000b80)=ANY=[@ANYBLOB="7ba8f8c81ba657e37300000000000000f4de344dd93d3035cd88c75cb3ef0892e6313fe283071a37ce106bb1cf7fc30c9c8bda2ef9cd886c7c1315729b34f8ced91549c4dbcd026ff7cf02901671beee07659cd458ad168e023e97537c91071797507107d300191114521f676a080000000000000072c2e72dbb079ee600b4835d6c99d4525ccde1fc95304908928bee89cb875c20698066d27d53e1bf6339066bc77548c64428e6bf32b6828d9b5c981e5f4e20ae903650d12c43c182e7458c04b5e113a717032d7807ed0080000000000000eb9730c922273dfcfbb18331e4df2fbdac4009df3c90ef194eea212e5f951c75d9fed156a1c4b3c3be788ec3846beba30bb2da91e2bb1566c132b82a02e508a3147afefe5a2dbbd9b29c04593122e44fc7d6c817e39cf962a05c3dd191bcaf54f5240d4a94abb26ddb6d73acfea7a4d666019f8b11dcccc4d71cf8cc951ac2d714766433dc5ed3d7ebf77dc6a44bab64308975b8d10ed945737fb6a0c3faff05f36a1fb8fd90d9e0238d7d5082e95e437f08efbb14cef872e8975c96721d564b50ba35a590f1856f82c083eb795030906b269539512e51084796546c49843fabc53640900e776b41c2256f2d76d8ce84c66c6739b1f4664f763db7f0000000007b33d6b9766b1c3aeac6419ff48767117e3f2bb7951bb45c300a923cec8286a40c4efcc56e629207d139681c0cabffb6a4fe57e74343c8306f4d752d49add67e0c691a33cf8157babfc9ea7d2a4a2a1d279536d0cea0e8b081714f"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x2}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) r7 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x800, 0x20000000, @perf_config_ext, 0x1411, 0xc92, 0x3e}, r7, 0x3, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000140)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000540)='./file0\x00', 0x0, 0x8}, 0xffffffffffffffca) close(r1) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)={r6}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNSETVNETLE(r8, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x0, &(0x7f0000000780)=ANY=[], 0x0}, 0x48) close(r9) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r10, &(0x7f00000000c0), 0xffffff19) 04:40:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400872339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xa5, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:02 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@ll, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f0000000700)=""/37, 0x25}], 0x5, &(0x7f00000007c0)=""/180, 0xb4}, 0x8060) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 04:40:02 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x700) 04:40:02 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2658.511781][ T5976] device nr0 entered promiscuous mode 04:40:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xa00) 04:40:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xf0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:02 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:02 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)=@ll, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f0000000700)=""/37, 0x25}], 0x5, &(0x7f00000007c0)=""/180, 0xb4}, 0x8060) 04:40:02 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2659.002276][ T5999] device nr0 entered promiscuous mode 04:40:02 executing program 4: r0 = socket$kcm(0x29, 0xffffdffffffffffd, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x4, 0x8, 0x100}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f0000000200)="f21c", 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000280)='cpB1\x82\x12,\xf8\x18\x11c\x17\v\x95\xdc\xa3\x18b\xbeV\x18\r\xe0Zt\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000340)='cp\xaf#\x8b\xa6\x12\xb9\x81\xc8\xe4\x1c\xc4\n+\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000580)=0x7, 0x12) r6 = openat$cgroup_ro(r2, &(0x7f0000000480)='pids.events\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000100)={r5}) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x3b, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x2}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) r7 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x800, 0x20000000, @perf_config_ext, 0x1411, 0xc92, 0x3e}, r7, 0x3, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000140)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000540)='./file0\x00', 0x0, 0x8}, 0xffffffffffffffca) close(r1) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)={r6}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNSETVNETLE(r8, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x0, &(0x7f0000000780)=ANY=[], 0x0}, 0x48) close(r9) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r10, &(0x7f00000000c0), 0xffffff19) 04:40:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400882339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xe00) 04:40:03 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c01000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x3a0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xf00) 04:40:03 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) 04:40:03 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xa00, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:03 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2659.645001][ T6025] device nr0 entered promiscuous mode 04:40:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x2000) 04:40:03 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:03 executing program 4: r0 = socket$kcm(0x29, 0xffffdffffffffffd, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x4, 0x8, 0x100}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f0000000200)="f21c", 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000280)='cpB1\x82\x12,\xf8\x18\x11c\x17\v\x95\xdc\xa3\x18b\xbeV\x18\r\xe0Zt\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000340)='cp\xaf#\x8b\xa6\x12\xb9\x81\xc8\xe4\x1c\xc4\n+\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000580)=0x7, 0x12) r6 = openat$cgroup_ro(r2, &(0x7f0000000480)='pids.events\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000100)={r5}) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x3b, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x2}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) r7 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x800, 0x20000000, @perf_config_ext, 0x1411, 0xc92, 0x3e}, r7, 0x3, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000140)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000540)='./file0\x00', 0x0, 0x8}, 0xffffffffffffffca) close(r1) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)={r6}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNSETVNETLE(r8, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x0, &(0x7f0000000780)=ANY=[], 0x0}, 0x48) close(r9) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r10, &(0x7f00000000c0), 0xffffff19) 04:40:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400892339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:03 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:03 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) 04:40:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xe00, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x3f00) 04:40:04 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2660.328175][ T6055] device nr0 entered promiscuous mode 04:40:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xec0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x4000) 04:40:04 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d3050000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:04 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) 04:40:04 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c02000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec4008a2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:04 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(0x0, r1, 0x7, r0, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000003c0)=r1, 0x12) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() perf_event_open(0x0, r4, 0x7, r3, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x7, 0x1, 0x0, 0x3, 0x8, 0x0, 0x5, 0x7fff, 0x6, 0x8, 0x5, 0x2, 0x3, 0x6, 0x7f, 0x3, 0x3aeb48d7, 0xc4f4, 0x7, 0x4, 0x80000001, 0x5c77, 0x100000001, 0x1c00000000000, 0x3ff, 0x7, 0x401, 0x2, 0xffffffff80000001, 0x21, 0x5, 0xfffffffffffffff9, 0x6, 0x80, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x8}, 0xaf4377d5dca746d1, 0x6, 0x400, 0x5, 0x5a4, 0x7, 0x1f}, r1, 0xb, r3, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0xfffffffffffffed9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) write$cgroup_pid(r6, 0x0, 0x0) setsockopt$sock_attach_bpf(r7, 0x29, 0x23, &(0x7f0000000280), 0xcc) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000080)) sendmsg(r7, &(0x7f00000000c0)={&(0x7f0000000000)=@nl=@unspec={0x0, 0x0, 0x0, 0x8000a0ffffffff}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:40:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x4800) [ 2660.811300][ T6083] device nr0 entered promiscuous mode 04:40:04 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f02000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xf00, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(0x0, r5, 0x7, r4, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r7 = getpid() perf_event_open(0x0, r7, 0x7, r6, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = getpid() perf_event_open(0x0, r9, 0x7, r8, 0x0) r10 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = getpid() perf_event_open(0x0, r11, 0x7, r10, 0x0) r12 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r13 = getpid() perf_event_open(0x0, r13, 0x7, r12, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000080)={'netdevsim0\x00', @local}) r14 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r14, &(0x7f00000003c0)=r13, 0x12) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRESHEX=r4, @ANYRESHEX, @ANYRESHEX=r10, @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="a6a3be45a87317f29192b1519c470971a9873bd32c08fc57e9138060d087fecffc59768bfad9a7b9b877548de4bc573b6b91af69bcc41f78c98b5d5d147fb03a31c1825657cb82a2e808b1a1021cc3fce625015c0f4eea9f5e83695d37d6", @ANYRES32, @ANYBLOB="877dde6beba42c9f9d4350e07bba2c16753c8d1b63d6a882b08decec7c8ea9f3dc44d18242be09b9b78b9cf7a9bb2af4c3a631084c76788969f68872425c49b3a40050d39191fff40352db3f71b8dbbe2742059a048200aa983edaa299afdbe1d3b81d67e88def784a3ecac11d12e86e5dc2588bc0d3147b43c62eaeda05daf183408123010343e5c99f4cdb667b593986af3f5fe2cf34"], @ANYRESOCT=r1, @ANYRESHEX=r6], @ANYRESOCT=r0, @ANYRES32=r13], 0x23) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="57cd707520"], 0x5) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="8315cd0883199069ec26c2a0046d2c7a6909712029bf254d5f212b9d9f91d13b66d1fd3ee607aac280fa4f9efd286cf11ac6c14798debe88e145f71e0b9a0fcad573444e38ba4fd39a9708c16a0cb1a2722ec256ef3d61853039862b32ec7abe1e9d2ae0531d2e5e2b4eba9e25161b2cd2d820399ec5a4fd8cefd63fc1b7f52e303ab078413efbc171e7b435cc7f3c9a21cc49d2a7a35a244680077c68"], 0xffffffffffffffc2) 04:40:04 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xb) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@fwd={0x3}, @enum={0x7, 0x3, 0x0, 0x6, 0x4, [{0xb, 0x90000000000000}, {0x10, 0x9}, {0xd, 0x7f}]}]}, {0x0, [0xca4d631e1225dced, 0x30]}}, &(0x7f00000002c0)=""/4096, 0x4c, 0x1000, 0x1}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00014107410000000a00180e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0xffffffffffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffa75, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xb7, 0x8, 0x0, 0xffffffffffff8b2c, 0xffff, 0x0, 0x1, 0x1ff, 0x100000000, 0x0, 0x0, 0xfff, 0x6, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:40:04 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x4c00) 04:40:05 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x3f00, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2661.597592][ T6118] device nr0 entered promiscuous mode 04:40:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec4008b2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:05 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:05 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x6000) 04:40:05 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2661.914636][ T6138] __nla_validate_parse: 26 callbacks suppressed [ 2661.914645][ T6138] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2661.975096][ T6135] device nr0 entered promiscuous mode 04:40:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x4000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:06 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2662.298486][ T6137] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:06 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xb) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@fwd={0x3}, @enum={0x7, 0x3, 0x0, 0x6, 0x4, [{0xb, 0x90000000000000}, {0x10, 0x9}, {0xd, 0x7f}]}]}, {0x0, [0xca4d631e1225dced, 0x30]}}, &(0x7f00000002c0)=""/4096, 0x4c, 0x1000, 0x1}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00014107410000000a00180e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0xffffffffffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffa75, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xb7, 0x8, 0x0, 0xffffffffffff8b2c, 0xffff, 0x0, 0x1, 0x1ff, 0x100000000, 0x0, 0x0, 0xfff, 0x6, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:40:06 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x6800) 04:40:06 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2662.445668][ T6160] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:06 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec4008c2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:06 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 2662.729672][ T6162] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x6000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2662.792484][ T6162] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x6c00) 04:40:06 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2662.887239][ T6176] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:06 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xb) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@fwd={0x3}, @enum={0x7, 0x3, 0x0, 0x6, 0x4, [{0xb, 0x90000000000000}, {0x10, 0x9}, {0xd, 0x7f}]}]}, {0x0, [0xca4d631e1225dced, 0x30]}}, &(0x7f00000002c0)=""/4096, 0x4c, 0x1000, 0x1}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00014107410000000a00180e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0xffffffffffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffa75, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xb7, 0x8, 0x0, 0xffffffffffff8b2c, 0xffff, 0x0, 0x1, 0x1ff, 0x100000000, 0x0, 0x0, 0xfff, 0x6, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:40:07 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2663.203070][ T6191] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:07 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 2663.281257][ T6195] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x7400) 04:40:07 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2663.417462][ T6206] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:07 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xa500, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2663.882158][ T6204] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec4008d2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:07 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa207000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x89f2, &(0x7f0000000100)={'sit0\x00', @empty=[0x0, 0x0, 0x43]}) r3 = openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000003bc0)=ANY=[@ANYBLOB="2b00000020e01bc65375e91cb09adb60b2efb49d6f0142e7cf6b72333eb10d7407519d32fa7668a51ec3c85c2371473527c8eca2665dbd64"], 0xffffffffffffffe0) r4 = socket$kcm(0xa, 0x6, 0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000240)={r2, r5}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003b00)={r5, 0xc0, &(0x7f0000003a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003900)=0x3, 0x0, 0x0, 0x0, &(0x7f0000003940)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000003980)={0x1, 0x8, 0xffff, 0x100000001}, &(0x7f00000039c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003a00)=0x5}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000003b80)={r3, 0x10, &(0x7f0000003b40)={&(0x7f0000003840)=""/187, 0xbb, r6}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r6, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x0, 0x4, 0x4, 0xfffffffffffffffc, 0x30, 0xffffffffffffffff, 0x0, [0x11], 0x0, r7, 0x0, 0x80000}, 0x3c) 04:40:07 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x7a00) 04:40:07 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000300)="f4001100002b2c25e994efd18498d64a05baa68754a30000000002003d0000000000000000ffffff84000000000022001c1fddf36b62ba0c9f275012f5724f8db19f230955a96780afc4ebc083c01a274556ec98cb5cf29d3e3486630e10385e492376cddff870647b8875d9bec9e79a8c9fb5ca5eee1c452310c4665f6e9025e23b909f50c891eb413e8c0e3079b2dea089ce8a8297ae4e266624796d2d8725bdf85501baaef869ea44afdf0b949821e41e35b4d1ce4418d379c733eb095be5e8915cf23431d05ba5972940a4a3f7d4ab55fbdacea4f5a6fa1e152118c9b3f12bfe1ba82adba220d960", 0xea}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400", 0x2a}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r5 = socket$kcm(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$TUNSETVNETLE(r7, 0x400454dc, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) r8 = socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r6, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000240)=r4, 0x4) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) 04:40:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xc00e, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2664.115273][ T6230] device nr0 entered promiscuous mode 04:40:07 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce02000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2664.304274][ T6240] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2664.317551][ T6240] CPU: 0 PID: 6240 Comm: syz-executor.4 Not tainted 5.3.0-rc7+ #0 [ 2664.325402][ T6240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2664.335456][ T6240] Call Trace: [ 2664.338757][ T6240] dump_stack+0x172/0x1f0 [ 2664.343090][ T6240] dump_header+0x10b/0x82d [ 2664.347501][ T6240] ? oom_kill_process+0x94/0x3f0 [ 2664.352440][ T6240] oom_kill_process.cold+0x10/0x15 [ 2664.357549][ T6240] out_of_memory+0x79a/0x12c0 [ 2664.357568][ T6240] ? lock_downgrade+0x920/0x920 [ 2664.357588][ T6240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2664.357605][ T6240] ? oom_killer_disable+0x280/0x280 [ 2664.373335][ T6240] ? __kasan_check_read+0x11/0x20 [ 2664.373357][ T6240] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2664.373370][ T6240] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2664.373387][ T6240] ? do_raw_spin_unlock+0x57/0x270 [ 2664.373402][ T6240] ? _raw_spin_unlock+0x2d/0x50 [ 2664.373415][ T6240] try_charge+0xf4b/0x1440 [ 2664.373433][ T6240] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2664.373445][ T6240] ? percpu_ref_tryget_live+0x111/0x290 [ 2664.373459][ T6240] ? get_mem_cgroup_from_mm+0x16/0x320 [ 2664.373480][ T6240] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2664.373494][ T6240] mem_cgroup_try_charge+0x136/0x590 [ 2664.373509][ T6240] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2664.373526][ T6240] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2664.389250][ T6240] __handle_mm_fault+0x1e34/0x3f20 [ 2664.453633][ T6240] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2664.459186][ T6240] ? __kasan_check_read+0x11/0x20 [ 2664.459212][ T6240] ? trace_hardirqs_on+0x67/0x240 [ 2664.459231][ T6240] handle_mm_fault+0x1b5/0x6b0 [ 2664.459250][ T6240] __do_page_fault+0x536/0xdd0 [ 2664.459270][ T6240] do_page_fault+0x38/0x590 [ 2664.459287][ T6240] page_fault+0x39/0x40 [ 2664.459297][ T6240] RIP: 0033:0x41122f [ 2664.459311][ T6240] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 2664.459318][ T6240] RSP: 002b:00007fff45c5e2e0 EFLAGS: 00010206 [ 2664.459328][ T6240] RAX: 00007f8832235000 RBX: 0000000000020000 RCX: 000000000045993a [ 2664.459335][ T6240] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 2664.459343][ T6240] RBP: 00007fff45c5e3c0 R08: ffffffffffffffff R09: 0000000000000000 [ 2664.459351][ T6240] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff45c5e4b0 [ 2664.459357][ T6240] R13: 00007f8832255700 R14: 0000000000000001 R15: 000000000075bfd4 [ 2664.557233][ T6240] memory: usage 11520kB, limit 0kB, failcnt 118 [ 2664.563679][ T6240] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2664.570752][ T6240] Memory cgroup stats for /syz4: [ 2664.570837][ T6240] anon 4235264 [ 2664.570837][ T6240] file 106496 [ 2664.570837][ T6240] kernel_stack 65536 [ 2664.570837][ T6240] slab 7143424 [ 2664.570837][ T6240] sock 139264 [ 2664.570837][ T6240] shmem 0 [ 2664.570837][ T6240] file_mapped 0 [ 2664.570837][ T6240] file_dirty 0 [ 2664.570837][ T6240] file_writeback 0 [ 2664.570837][ T6240] anon_thp 4194304 [ 2664.570837][ T6240] inactive_anon 0 [ 2664.570837][ T6240] active_anon 4235264 [ 2664.570837][ T6240] inactive_file 0 [ 2664.570837][ T6240] active_file 0 [ 2664.570837][ T6240] unevictable 0 [ 2664.570837][ T6240] slab_reclaimable 2973696 [ 2664.570837][ T6240] slab_unreclaimable 4169728 [ 2664.570837][ T6240] pgfault 407352 [ 2664.570837][ T6240] pgmajfault 0 [ 2664.570837][ T6240] workingset_refault 0 [ 2664.570837][ T6240] workingset_activate 0 [ 2664.570837][ T6240] workingset_nodereclaim 0 [ 2664.570837][ T6240] pgrefill 265 [ 2664.570837][ T6240] pgscan 523 [ 2664.570837][ T6240] pgsteal 227 [ 2664.570837][ T6240] pgactivate 231 [ 2664.575917][ T6240] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=6240,uid=0 [ 2664.682226][ T6240] Memory cgroup out of memory: Killed process 6240 (syz-executor.4) total-vm:72708kB, anon-rss:4200kB, file-rss:34816kB, shmem-rss:0kB 04:40:08 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000300)="f4001100002b2c25e994efd18498d64a05baa68754a30000000002003d0000000000000000ffffff84000000000022001c1fddf36b62ba0c9f275012f5724f8db19f230955a96780afc4ebc083c01a274556ec98cb5cf29d3e3486630e10385e492376cddff870647b8875d9bec9e79a8c9fb5ca5eee1c452310c4665f6e9025e23b909f50c891eb413e8c0e3079b2dea089ce8a8297ae4e266624796d2d8725bdf85501baaef869ea44afdf0b949821e41e35b4d1ce4418d379c733eb095be5e8915cf23431d05ba5972940a4a3f7d4ab55fbdacea4f5a6fa1e152118c9b3f12bfe1ba82adba220d960", 0xea}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400", 0x2a}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r5 = socket$kcm(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$TUNSETVNETLE(r7, 0x400454dc, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) r8 = socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r6, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000240)=r4, 0x4) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) [ 2664.701297][ T1057] oom_reaper: reaped process 6240 (syz-executor.4), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB [ 2664.735266][ T4089] syz-executor.4 invoked oom-killer: gfp_mask=0x40cd0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 2664.760535][ T4089] CPU: 1 PID: 4089 Comm: syz-executor.4 Not tainted 5.3.0-rc7+ #0 [ 2664.768372][ T4089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2664.779116][ T4089] Call Trace: [ 2664.782406][ T4089] dump_stack+0x172/0x1f0 [ 2664.786735][ T4089] dump_header+0x10b/0x82d [ 2664.791143][ T4089] ? oom_kill_process+0x94/0x3f0 [ 2664.796082][ T4089] oom_kill_process.cold+0x10/0x15 [ 2664.801196][ T4089] out_of_memory+0x79a/0x12c0 [ 2664.805866][ T4089] ? lock_downgrade+0x920/0x920 [ 2664.810718][ T4089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2664.816954][ T4089] ? oom_killer_disable+0x280/0x280 [ 2664.822156][ T4089] ? __kasan_check_read+0x11/0x20 [ 2664.827177][ T4089] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2664.832713][ T4089] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2664.838328][ T4089] ? do_raw_spin_unlock+0x57/0x270 [ 2664.843420][ T4089] ? _raw_spin_unlock+0x2d/0x50 [ 2664.848253][ T4089] try_charge+0xf4b/0x1440 [ 2664.852648][ T4089] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2664.858865][ T4089] ? write_comp_data+0x60/0x70 [ 2664.863606][ T4089] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2664.869151][ T4089] ? perf_trace_lock_acquire+0xf5/0x530 [ 2664.874720][ T4089] ? cache_grow_begin+0x122/0xd20 [ 2664.879736][ T4089] ? __kasan_check_read+0x11/0x20 [ 2664.884741][ T4089] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2664.890213][ T4089] ? memcg_kmem_put_cache+0x50/0x50 [ 2664.895386][ T4089] ? cache_grow_begin+0x709/0xd20 [ 2664.900398][ T4089] cache_grow_begin+0x627/0xd20 [ 2664.905229][ T4089] ? write_comp_data+0x61/0x70 [ 2664.909968][ T4089] ? mempolicy_slab_node+0x139/0x390 [ 2664.915230][ T4089] fallback_alloc+0x1fd/0x2d0 [ 2664.919886][ T4089] ____cache_alloc_node+0x1bc/0x1d0 [ 2664.925067][ T4089] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2664.931288][ T4089] kmem_cache_alloc+0x1ef/0x710 [ 2664.936114][ T4089] ? iget_locked+0x77/0x4b0 [ 2664.940599][ T4089] alloc_inode+0x16f/0x1e0 [ 2664.945007][ T4089] iget_locked+0x1a6/0x4b0 [ 2664.949404][ T4089] kernfs_get_inode+0x4e/0x580 [ 2664.954150][ T4089] kernfs_iop_lookup+0x1ab/0x230 [ 2664.959074][ T4089] __lookup_slow+0x279/0x500 [ 2664.963642][ T4089] ? vfs_unlink+0x620/0x620 [ 2664.968135][ T4089] lookup_slow+0x58/0x80 [ 2664.972358][ T4089] path_mountpoint+0x5d2/0x1e60 [ 2664.977198][ T4089] ? debug_smp_processor_id+0x3c/0x214 [ 2664.982634][ T4089] ? perf_trace_lock_acquire+0xf5/0x530 [ 2664.988173][ T4089] ? path_openat+0x4630/0x4630 [ 2664.992922][ T4089] ? __kasan_check_read+0x11/0x20 [ 2664.997926][ T4089] filename_mountpoint+0x190/0x3c0 [ 2665.003016][ T4089] ? rwlock_bug.part.0+0x90/0x90 [ 2665.007940][ T4089] ? filename_parentat.isra.0+0x410/0x410 [ 2665.013650][ T4089] ? __phys_addr_symbol+0x30/0x70 [ 2665.018651][ T4089] ? __check_object_size+0x3d/0x437 [ 2665.023836][ T4089] ? strncpy_from_user+0x2b4/0x400 [ 2665.028922][ T4089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2665.035156][ T4089] ? getname_flags+0x277/0x5b0 [ 2665.039897][ T4089] user_path_mountpoint_at+0x3a/0x50 [ 2665.045162][ T4089] ksys_umount+0x167/0xf00 [ 2665.049556][ T4089] ? down_read_non_owner+0x450/0x450 [ 2665.054817][ T4089] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2665.061034][ T4089] ? __detach_mounts+0x2a0/0x2a0 [ 2665.065964][ T4089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2665.072185][ T4089] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2665.078230][ T4089] ? trace_hardirqs_off_caller+0x65/0x230 [ 2665.083927][ T4089] __x64_sys_umount+0x54/0x80 [ 2665.088584][ T4089] do_syscall_64+0xfd/0x6a0 [ 2665.093070][ T4089] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2665.098938][ T4089] RIP: 0033:0x45c317 [ 2665.102824][ T4089] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2665.122404][ T4089] RSP: 002b:00007fff45c5d488 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 2665.130793][ T4089] RAX: ffffffffffffffda RBX: 000000000028a72c RCX: 000000000045c317 [ 2665.138741][ T4089] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007fff45c5d530 [ 2665.146704][ T4089] RBP: 0000000000000154 R08: 0000000000000000 R09: 000000000000000f [ 2665.154656][ T4089] R10: 000000000000000a R11: 0000000000000206 R12: 00007fff45c5e5c0 04:40:08 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x9f02) [ 2665.162611][ T4089] R13: 00005555570d9940 R14: 0000000000000000 R15: 00007fff45c5e5c0 [ 2665.177934][ T4089] memory: usage 7128kB, limit 0kB, failcnt 131 [ 2665.185699][ T4089] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2665.192714][ T4089] Memory cgroup stats for /syz4: [ 2665.192816][ T4089] anon 0 [ 2665.192816][ T4089] file 106496 [ 2665.192816][ T4089] kernel_stack 0 [ 2665.192816][ T4089] slab 7143424 [ 2665.192816][ T4089] sock 139264 [ 2665.192816][ T4089] shmem 0 [ 2665.192816][ T4089] file_mapped 0 [ 2665.192816][ T4089] file_dirty 0 [ 2665.192816][ T4089] file_writeback 0 [ 2665.192816][ T4089] anon_thp 0 [ 2665.192816][ T4089] inactive_anon 0 [ 2665.192816][ T4089] active_anon 0 [ 2665.192816][ T4089] inactive_file 0 [ 2665.192816][ T4089] active_file 0 [ 2665.192816][ T4089] unevictable 0 [ 2665.192816][ T4089] slab_reclaimable 2973696 [ 2665.192816][ T4089] slab_unreclaimable 4169728 [ 2665.192816][ T4089] pgfault 407352 [ 2665.192816][ T4089] pgmajfault 0 [ 2665.192816][ T4089] workingset_refault 0 [ 2665.192816][ T4089] workingset_activate 0 [ 2665.192816][ T4089] workingset_nodereclaim 0 [ 2665.192816][ T4089] pgrefill 265 [ 2665.192816][ T4089] pgscan 523 [ 2665.192816][ T4089] pgsteal 227 [ 2665.192816][ T4089] pgactivate 231 [ 2665.287644][ T4089] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=4089,uid=0 [ 2665.303120][ T4089] Memory cgroup out of memory: Killed process 4089 (syz-executor.4) total-vm:72444kB, anon-rss:104kB, file-rss:35776kB, shmem-rss:0kB [ 2665.317651][ T1057] oom_reaper: reaped process 4089 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 04:40:09 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xf000) [ 2665.697891][ T6256] device nr0 entered promiscuous mode 04:40:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec4008e2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:09 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd401000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xf000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:09 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000300)="f4001100002b2c25e994efd18498d64a05baa68754a30000000002003d0000000000000000ffffff84000000000022001c1fddf36b62ba0c9f275012f5724f8db19f230955a96780afc4ebc083c01a274556ec98cb5cf29d3e3486630e10385e492376cddff870647b8875d9bec9e79a8c9fb5ca5eee1c452310c4665f6e9025e23b909f50c891eb413e8c0e3079b2dea089ce8a8297ae4e266624796d2d8725bdf85501baaef869ea44afdf0b949821e41e35b4d1ce4418d379c733eb095be5e8915cf23431d05ba5972940a4a3f7d4ab55fbdacea4f5a6fa1e152118c9b3f12bfe1ba82adba220d960", 0xea}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400", 0x2a}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r5 = socket$kcm(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$TUNSETVNETLE(r7, 0x400454dc, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) r8 = socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r6, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000240)=r4, 0x4) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) 04:40:09 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x34000) 04:40:09 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:10 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2666.281091][ T6275] device nr0 entered promiscuous mode 04:40:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x34000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:10 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:10 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe03000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x400300) 04:40:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec4008f2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:10 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2666.794436][ T6287] device nr0 entered promiscuous mode 04:40:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x8000a0) [ 2666.957342][ T6302] __nla_validate_parse: 15 callbacks suppressed [ 2666.957350][ T6302] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2667.175320][ T6304] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2667.195601][ T6307] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2667.221887][ T6309] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2667.505795][ T6312] IPVS: ftp: loaded support on port[0] = 21 [ 2667.734886][ T6312] chnl_net:caif_netlink_parms(): no params data found [ 2667.766259][ T6312] bridge0: port 1(bridge_slave_0) entered blocking state [ 2667.773462][ T6312] bridge0: port 1(bridge_slave_0) entered disabled state [ 2667.782508][ T6312] device bridge_slave_0 entered promiscuous mode [ 2667.790946][ T6312] bridge0: port 2(bridge_slave_1) entered blocking state [ 2667.798027][ T6312] bridge0: port 2(bridge_slave_1) entered disabled state [ 2667.806980][ T6312] device bridge_slave_1 entered promiscuous mode [ 2667.880661][ T6312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2667.893313][ T6312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2667.917358][ T6312] team0: Port device team_slave_0 added [ 2667.983862][ T6312] team0: Port device team_slave_1 added [ 2668.031697][ T6312] device hsr_slave_0 entered promiscuous mode [ 2668.082132][ T6312] device hsr_slave_1 entered promiscuous mode [ 2668.138437][ T6312] debugfs: Directory 'hsr0' with parent '/' already present! [ 2668.216882][ T6312] bridge0: port 2(bridge_slave_1) entered blocking state [ 2668.223967][ T6312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2668.231374][ T6312] bridge0: port 1(bridge_slave_0) entered blocking state [ 2668.238598][ T6312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2668.327294][ T6312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2668.370363][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2668.379937][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 2668.388828][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 2668.436910][ T6312] 8021q: adding VLAN 0 to HW filter on device team0 [ 2668.452631][T26998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2668.461885][T26998] bridge0: port 1(bridge_slave_0) entered blocking state [ 2668.468963][T26998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2668.489476][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2668.498822][ T7815] bridge0: port 2(bridge_slave_1) entered blocking state [ 2668.505872][ T7815] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2668.564019][T26998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2668.573563][T26998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2668.586804][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2668.597808][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2668.653691][ T8192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2668.666294][ T8192] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2668.680854][T26998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2668.690987][T26998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2668.754487][ T6312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2668.783930][ T6312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2668.956866][ T6319] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2668.967196][ T6319] CPU: 1 PID: 6319 Comm: syz-executor.4 Not tainted 5.3.0-rc7+ #0 [ 2668.974995][ T6319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2668.985046][ T6319] Call Trace: [ 2668.988331][ T6319] dump_stack+0x172/0x1f0 [ 2668.992643][ T6319] dump_header+0x10b/0x82d [ 2668.997038][ T6319] oom_kill_process.cold+0x10/0x15 [ 2669.002140][ T6319] out_of_memory+0x79a/0x12c0 [ 2669.006795][ T6319] ? __sched_text_start+0x8/0x8 [ 2669.011624][ T6319] ? oom_killer_disable+0x280/0x280 [ 2669.016802][ T6319] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2669.022346][ T6319] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2669.027960][ T6319] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2669.033741][ T6319] ? cgroup_file_notify+0x140/0x1b0 [ 2669.038919][ T6319] memory_max_write+0x262/0x3a0 [ 2669.043750][ T6319] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 2669.050502][ T6319] ? lock_acquire+0x190/0x410 [ 2669.055157][ T6319] ? kernfs_fop_write+0x227/0x480 [ 2669.060161][ T6319] cgroup_file_write+0x241/0x790 [ 2669.065077][ T6319] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 2669.071829][ T6319] ? cgroup_migrate_add_task+0x890/0x890 [ 2669.077441][ T6319] ? __might_fault+0x1a3/0x1e0 [ 2669.082184][ T6319] ? cgroup_migrate_add_task+0x890/0x890 [ 2669.087793][ T6319] kernfs_fop_write+0x2b8/0x480 [ 2669.092638][ T6319] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2669.098855][ T6319] __vfs_write+0x8a/0x110 [ 2669.103166][ T6319] ? kernfs_fop_open+0xd80/0xd80 [ 2669.108079][ T6319] vfs_write+0x268/0x5d0 [ 2669.112308][ T6319] ksys_write+0x14f/0x290 [ 2669.116625][ T6319] ? __ia32_sys_read+0xb0/0xb0 [ 2669.121382][ T6319] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2669.127427][ T6319] __x64_sys_write+0x73/0xb0 [ 2669.131996][ T6319] do_syscall_64+0xfd/0x6a0 [ 2669.136476][ T6319] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2669.142346][ T6319] RIP: 0033:0x4598e9 [ 2669.146217][ T6319] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2669.165798][ T6319] RSP: 002b:00007f7d1369fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2669.174185][ T6319] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2669.182131][ T6319] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 2669.190078][ T6319] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2669.198029][ T6319] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d136a06d4 [ 2669.205976][ T6319] R13: 00000000004c9a52 R14: 00000000004e1148 R15: 00000000ffffffff [ 2669.216463][ T6319] memory: usage 11312kB, limit 0kB, failcnt 140 [ 2669.223533][ T6319] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2669.230584][ T6319] Memory cgroup stats for /syz4: [ 2669.231499][ T6319] anon 4313088 [ 2669.231499][ T6319] file 106496 [ 2669.231499][ T6319] kernel_stack 0 [ 2669.231499][ T6319] slab 7143424 [ 2669.231499][ T6319] sock 139264 [ 2669.231499][ T6319] shmem 0 [ 2669.231499][ T6319] file_mapped 0 [ 2669.231499][ T6319] file_dirty 0 [ 2669.231499][ T6319] file_writeback 0 [ 2669.231499][ T6319] anon_thp 4194304 [ 2669.231499][ T6319] inactive_anon 0 [ 2669.231499][ T6319] active_anon 4313088 [ 2669.231499][ T6319] inactive_file 0 [ 2669.231499][ T6319] active_file 0 [ 2669.231499][ T6319] unevictable 0 [ 2669.231499][ T6319] slab_reclaimable 2973696 [ 2669.231499][ T6319] slab_unreclaimable 4169728 [ 2669.231499][ T6319] pgfault 407451 [ 2669.231499][ T6319] pgmajfault 0 [ 2669.231499][ T6319] workingset_refault 0 [ 2669.231499][ T6319] workingset_activate 0 [ 2669.231499][ T6319] workingset_nodereclaim 0 [ 2669.231499][ T6319] pgrefill 265 [ 2669.231499][ T6319] pgscan 523 [ 2669.231499][ T6319] pgsteal 227 [ 2669.231499][ T6319] pgactivate 231 [ 2669.334874][ T6319] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=6318,uid=0 04:40:13 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000300)="f4001100002b2c25e994efd18498d64a05baa68754a30000000002003d0000000000000000ffffff84000000000022001c1fddf36b62ba0c9f275012f5724f8db19f230955a96780afc4ebc083c01a274556ec98cb5cf29d3e3486630e10385e492376cddff870647b8875d9bec9e79a8c9fb5ca5eee1c452310c4665f6e9025e23b909f50c891eb413e8c0e3079b2dea089ce8a8297ae4e266624796d2d8725bdf85501baaef869ea44afdf0b949821e41e35b4d1ce4418d379c733eb095be5e8915cf23431d05ba5972940a4a3f7d4ab55fbdacea4f5a6fa1e152118c9b3f12bfe1ba82adba220d960", 0xea}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400", 0x2a}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r5 = socket$kcm(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$TUNSETVNETLE(r7, 0x400454dc, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) r8 = socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r6, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000240)=r4, 0x4) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) 04:40:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x400300, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:13 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff5ffa5f00000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:13 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:13 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x8001a0) 04:40:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400902339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) [ 2669.352019][ T6319] Memory cgroup out of memory: Killed process 6318 (syz-executor.4) total-vm:72712kB, anon-rss:4232kB, file-rss:35844kB, shmem-rss:0kB [ 2669.373162][ T1057] oom_reaper: reaped process 6318 (syz-executor.4), now anon-rss:0kB, file-rss:34884kB, shmem-rss:0kB [ 2669.432367][ T6312] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2669.444701][ T6312] CPU: 1 PID: 6312 Comm: syz-executor.4 Not tainted 5.3.0-rc7+ #0 [ 2669.452525][ T6312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2669.462571][ T6312] Call Trace: [ 2669.465858][ T6312] dump_stack+0x172/0x1f0 [ 2669.470182][ T6312] dump_header+0x10b/0x82d [ 2669.474579][ T6312] ? oom_kill_process+0x94/0x3f0 [ 2669.479501][ T6312] oom_kill_process.cold+0x10/0x15 [ 2669.484601][ T6312] out_of_memory+0x79a/0x12c0 [ 2669.489263][ T6312] ? lock_downgrade+0x920/0x920 [ 2669.494102][ T6312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2669.500327][ T6312] ? oom_killer_disable+0x280/0x280 [ 2669.505516][ T6312] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2669.511044][ T6312] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2669.516664][ T6312] ? do_raw_spin_unlock+0x57/0x270 [ 2669.521762][ T6312] ? _raw_spin_unlock+0x2d/0x50 [ 2669.526597][ T6312] try_charge+0xf4b/0x1440 [ 2669.531003][ T6312] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2669.536529][ T6312] ? percpu_ref_tryget_live+0x111/0x290 [ 2669.542070][ T6312] ? get_mem_cgroup_from_mm+0x16/0x320 [ 2669.547519][ T6312] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2669.553046][ T6312] mem_cgroup_try_charge+0x136/0x590 [ 2669.558316][ T6312] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2669.564540][ T6312] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2669.570160][ T6312] wp_page_copy+0x41e/0x15e0 [ 2669.574732][ T6312] ? page_trans_huge_mapcount+0x166/0x450 [ 2669.580440][ T6312] ? pmd_pfn+0x1d0/0x1d0 [ 2669.584671][ T6312] ? lock_downgrade+0x920/0x920 [ 2669.589510][ T6312] ? swp_swapcount+0x540/0x540 [ 2669.594259][ T6312] ? __kasan_check_read+0x11/0x20 [ 2669.599276][ T6312] ? do_raw_spin_unlock+0x57/0x270 [ 2669.604372][ T6312] do_wp_page+0x499/0x14d0 [ 2669.608776][ T6312] ? finish_mkwrite_fault+0x570/0x570 [ 2669.614139][ T6312] __handle_mm_fault+0x22f1/0x3f20 [ 2669.619240][ T6312] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2669.624764][ T6312] ? __kasan_check_read+0x11/0x20 [ 2669.629787][ T6312] ? trace_hardirqs_on+0x67/0x240 [ 2669.634797][ T6312] handle_mm_fault+0x1b5/0x6b0 [ 2669.639547][ T6312] __do_page_fault+0x536/0xdd0 [ 2669.644304][ T6312] do_page_fault+0x38/0x590 [ 2669.648795][ T6312] page_fault+0x39/0x40 [ 2669.652933][ T6312] RIP: 0033:0x4309c6 [ 2669.656812][ T6312] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 9c 45 64 00 85 c0 0f 84 [ 2669.676408][ T6312] RSP: 002b:00007ffce6be13b0 EFLAGS: 00010206 [ 2669.682455][ T6312] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 2669.690406][ T6312] RDX: 0000555555a3d930 RSI: 0000555555a45970 RDI: 0000000000000003 [ 2669.698360][ T6312] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555555a3c940 [ 2669.706314][ T6312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 2669.714276][ T6312] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 2669.726858][ T6335] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:13 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2669.771658][ T6324] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2669.874900][ T6312] memory: usage 6900kB, limit 0kB, failcnt 149 [ 2669.881854][ T6312] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2669.894178][ T6333] device nr0 entered promiscuous mode [ 2669.904222][ T6312] Memory cgroup stats for /syz4: [ 2669.904302][ T6312] anon 53248 [ 2669.904302][ T6312] file 106496 [ 2669.904302][ T6312] kernel_stack 0 [ 2669.904302][ T6312] slab 7143424 [ 2669.904302][ T6312] sock 139264 [ 2669.904302][ T6312] shmem 0 [ 2669.904302][ T6312] file_mapped 0 [ 2669.904302][ T6312] file_dirty 0 [ 2669.904302][ T6312] file_writeback 0 [ 2669.904302][ T6312] anon_thp 0 [ 2669.904302][ T6312] inactive_anon 0 [ 2669.904302][ T6312] active_anon 53248 [ 2669.904302][ T6312] inactive_file 0 [ 2669.904302][ T6312] active_file 0 [ 2669.904302][ T6312] unevictable 0 [ 2669.904302][ T6312] slab_reclaimable 2973696 [ 2669.904302][ T6312] slab_unreclaimable 4169728 [ 2669.904302][ T6312] pgfault 407451 [ 2669.904302][ T6312] pgmajfault 0 [ 2669.904302][ T6312] workingset_refault 0 [ 2669.904302][ T6312] workingset_activate 0 [ 2669.904302][ T6312] workingset_nodereclaim 0 [ 2669.904302][ T6312] pgrefill 265 [ 2669.904302][ T6312] pgscan 523 [ 2669.904302][ T6312] pgsteal 227 [ 2669.904302][ T6312] pgactivate 231 [ 2669.999088][ T6312] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=6312,uid=0 [ 2670.014493][ T6312] Memory cgroup out of memory: Killed process 6312 (syz-executor.4) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 2670.028909][ T1057] oom_reaper: reaped process 6312 (syz-executor.4), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 2670.086551][ T6329] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:13 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xf0ffff) 04:40:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x8000a0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:13 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 2670.163635][ T6334] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:14 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffc8ffffffffff}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:14 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000300)="f4001100002b2c25e994efd18498d64a05baa68754a30000000002003d0000000000000000ffffff84000000000022001c1fddf36b62ba0c9f275012f5724f8db19f230955a96780afc4ebc083c01a274556ec98cb5cf29d3e3486630e10385e492376cddff870647b8875d9bec9e79a8c9fb5ca5eee1c452310c4665f6e9025e23b909f50c891eb413e8c0e3079b2dea089ce8a8297ae4e266624796d2d8725bdf85501baaef869ea44afdf0b949821e41e35b4d1ce4418d379c733eb095be5e8915cf23431d05ba5972940a4a3f7d4ab55fbdacea4f5a6fa1e152118c9b3f12bfe1ba82adba220d960", 0xea}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400", 0x2a}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r5 = socket$kcm(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$TUNSETVNETLE(r7, 0x400454dc, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) r8 = socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r6, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000240)=r4, 0x4) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) 04:40:14 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2670.491142][ T6351] device nr0 entered promiscuous mode 04:40:14 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000300)="f4001100002b2c25e994efd18498d64a05baa68754a30000000002003d0000000000000000ffffff84000000000022001c1fddf36b62ba0c9f275012f5724f8db19f230955a96780afc4ebc083c01a274556ec98cb5cf29d3e3486630e10385e492376cddff870647b8875d9bec9e79a8c9fb5ca5eee1c452310c4665f6e9025e23b909f50c891eb413e8c0e3079b2dea089ce8a8297ae4e266624796d2d8725bdf85501baaef869ea44afdf0b949821e41e35b4d1ce4418d379c733eb095be5e8915cf23431d05ba5972940a4a3f7d4ab55fbdacea4f5a6fa1e152118c9b3f12bfe1ba82adba220d960", 0xea}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400", 0x2a}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r5 = socket$kcm(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$TUNSETVNETLE(r7, 0x400454dc, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) r8 = socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) write$cgroup_int(r6, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000240)=r4, 0x4) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) 04:40:14 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x1000000) 04:40:14 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:14 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0008000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400912339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) [ 2670.874571][ T6363] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2670.940762][ T6374] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x8001a0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:14 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0018000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:14 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x2000000) 04:40:15 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:15 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0030000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:15 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x3000000) 04:40:15 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffc8ffff}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2672.285783][ T6407] IPVS: ftp: loaded support on port[0] = 21 [ 2672.416691][ T6407] chnl_net:caif_netlink_parms(): no params data found [ 2672.503451][ T6407] bridge0: port 1(bridge_slave_0) entered blocking state [ 2672.511071][ T6407] bridge0: port 1(bridge_slave_0) entered disabled state [ 2672.519931][ T6407] device bridge_slave_0 entered promiscuous mode [ 2672.528026][ T6407] bridge0: port 2(bridge_slave_1) entered blocking state [ 2672.535169][ T6407] bridge0: port 2(bridge_slave_1) entered disabled state [ 2672.543562][ T6407] device bridge_slave_1 entered promiscuous mode [ 2672.622717][ T6407] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2672.636668][ T6407] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2672.660868][ T6407] team0: Port device team_slave_0 added [ 2672.670078][ T6407] team0: Port device team_slave_1 added [ 2672.791793][ T6407] device hsr_slave_0 entered promiscuous mode [ 2672.829669][ T6407] device hsr_slave_1 entered promiscuous mode [ 2672.878290][ T6407] debugfs: Directory 'hsr0' with parent '/' already present! [ 2672.937446][ T6407] bridge0: port 2(bridge_slave_1) entered blocking state [ 2672.944567][ T6407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2672.951889][ T6407] bridge0: port 1(bridge_slave_0) entered blocking state [ 2672.958960][ T6407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2673.044111][ T6407] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2673.112253][ T8192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2673.122473][ T8192] bridge0: port 1(bridge_slave_0) entered disabled state [ 2673.130631][ T8192] bridge0: port 2(bridge_slave_1) entered disabled state [ 2673.139847][ T8192] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2673.194679][ T6407] 8021q: adding VLAN 0 to HW filter on device team0 [ 2673.208890][ T9191] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2673.217870][ T9191] bridge0: port 1(bridge_slave_0) entered blocking state [ 2673.225018][ T9191] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2673.241818][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2673.253530][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 2673.260645][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2673.333533][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2673.343004][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2673.352864][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2673.417399][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2673.439536][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2673.449001][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2673.461812][ T6407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2673.520901][ T6407] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2673.665542][ T6414] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2673.675909][ T6414] CPU: 0 PID: 6414 Comm: syz-executor.4 Not tainted 5.3.0-rc7+ #0 [ 2673.683705][ T6414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2673.693936][ T6414] Call Trace: [ 2673.697208][ T6414] dump_stack+0x172/0x1f0 [ 2673.701515][ T6414] dump_header+0x10b/0x82d [ 2673.705907][ T6414] oom_kill_process.cold+0x10/0x15 [ 2673.710997][ T6414] out_of_memory+0x79a/0x12c0 [ 2673.715652][ T6414] ? __sched_text_start+0x8/0x8 [ 2673.720477][ T6414] ? oom_killer_disable+0x280/0x280 [ 2673.725653][ T6414] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2673.731219][ T6414] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2673.736830][ T6414] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2673.742610][ T6414] ? cgroup_file_notify+0x140/0x1b0 [ 2673.747798][ T6414] memory_max_write+0x262/0x3a0 [ 2673.752631][ T6414] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 2673.759369][ T6414] ? lock_acquire+0x190/0x410 [ 2673.764021][ T6414] ? kernfs_fop_write+0x227/0x480 [ 2673.769022][ T6414] cgroup_file_write+0x241/0x790 [ 2673.773942][ T6414] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 2673.780678][ T6414] ? cgroup_migrate_add_task+0x890/0x890 [ 2673.786285][ T6414] ? __might_fault+0x1a3/0x1e0 [ 2673.791072][ T6414] ? cgroup_migrate_add_task+0x890/0x890 [ 2673.796691][ T6414] kernfs_fop_write+0x2b8/0x480 [ 2673.801536][ T6414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2673.807755][ T6414] __vfs_write+0x8a/0x110 [ 2673.812060][ T6414] ? kernfs_fop_open+0xd80/0xd80 [ 2673.817007][ T6414] vfs_write+0x268/0x5d0 [ 2673.821229][ T6414] ksys_write+0x14f/0x290 [ 2673.825533][ T6414] ? __ia32_sys_read+0xb0/0xb0 [ 2673.830274][ T6414] __x64_sys_write+0x73/0xb0 [ 2673.834838][ T6414] ? do_syscall_64+0x5b/0x6a0 [ 2673.839500][ T6414] do_syscall_64+0xfd/0x6a0 [ 2673.843979][ T6414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2673.849845][ T6414] RIP: 0033:0x4598e9 [ 2673.853717][ T6414] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2673.873297][ T6414] RSP: 002b:00007efdca04ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2673.881688][ T6414] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 2673.889643][ T6414] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 2673.897589][ T6414] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2673.905534][ T6414] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efdca04b6d4 [ 2673.913480][ T6414] R13: 00000000004c9a52 R14: 00000000004e1148 R15: 00000000ffffffff [ 2673.924709][ T6414] memory: usage 10924kB, limit 0kB, failcnt 158 [ 2673.936863][ T6414] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2673.944426][ T6414] Memory cgroup stats for /syz4: [ 2673.945334][ T6414] anon 4329472 [ 2673.945334][ T6414] file 106496 [ 2673.945334][ T6414] kernel_stack 0 [ 2673.945334][ T6414] slab 6733824 [ 2673.945334][ T6414] sock 139264 [ 2673.945334][ T6414] shmem 0 [ 2673.945334][ T6414] file_mapped 0 [ 2673.945334][ T6414] file_dirty 0 [ 2673.945334][ T6414] file_writeback 0 [ 2673.945334][ T6414] anon_thp 4194304 [ 2673.945334][ T6414] inactive_anon 0 [ 2673.945334][ T6414] active_anon 4329472 [ 2673.945334][ T6414] inactive_file 0 [ 2673.945334][ T6414] active_file 0 [ 2673.945334][ T6414] unevictable 0 [ 2673.945334][ T6414] slab_reclaimable 2838528 [ 2673.945334][ T6414] slab_unreclaimable 3895296 [ 2673.945334][ T6414] pgfault 407517 [ 2673.945334][ T6414] pgmajfault 0 [ 2673.945334][ T6414] workingset_refault 0 [ 2673.945334][ T6414] workingset_activate 0 [ 2673.945334][ T6414] workingset_nodereclaim 0 [ 2673.945334][ T6414] pgrefill 265 [ 2673.945334][ T6414] pgscan 523 [ 2673.945334][ T6414] pgsteal 227 [ 2673.945334][ T6414] pgactivate 231 [ 2674.042715][ T6414] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=6413,uid=0 [ 2674.062759][ T6414] Memory cgroup out of memory: Killed process 6413 (syz-executor.4) total-vm:72712kB, anon-rss:4228kB, file-rss:35844kB, shmem-rss:0kB [ 2674.081411][ T1057] oom_reaper: reaped process 6413 (syz-executor.4), now anon-rss:0kB, file-rss:34892kB, shmem-rss:0kB 04:40:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x17, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000631104000000000095003e0000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 04:40:17 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:17 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x4000000) 04:40:17 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x2, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400922339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) [ 2674.143918][ T6407] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2674.165000][ T6407] CPU: 0 PID: 6407 Comm: syz-executor.4 Not tainted 5.3.0-rc7+ #0 [ 2674.172830][ T6407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2674.182883][ T6407] Call Trace: [ 2674.186173][ T6407] dump_stack+0x172/0x1f0 04:40:17 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 2674.190505][ T6407] dump_header+0x10b/0x82d [ 2674.194922][ T6407] ? oom_kill_process+0x94/0x3f0 [ 2674.199857][ T6407] oom_kill_process.cold+0x10/0x15 [ 2674.204964][ T6407] out_of_memory+0x79a/0x12c0 [ 2674.209640][ T6407] ? lock_downgrade+0x920/0x920 [ 2674.213348][ T6425] __nla_validate_parse: 5 callbacks suppressed [ 2674.213356][ T6425] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2674.214490][ T6407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2674.214508][ T6407] ? oom_killer_disable+0x280/0x280 [ 2674.241329][ T6407] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2674.246980][ T6407] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2674.250862][ T6425] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2674.252618][ T6407] ? do_raw_spin_unlock+0x57/0x270 [ 2674.252638][ T6407] ? _raw_spin_unlock+0x2d/0x50 [ 2674.271817][ T6407] try_charge+0xf4b/0x1440 [ 2674.276234][ T6407] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2674.281775][ T6407] ? percpu_ref_tryget_live+0x111/0x290 [ 2674.287318][ T6407] ? get_mem_cgroup_from_mm+0x16/0x320 04:40:18 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 2674.292790][ T6407] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2674.298333][ T6407] mem_cgroup_try_charge+0x136/0x590 [ 2674.303722][ T6407] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2674.309961][ T6407] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2674.315587][ T6407] wp_page_copy+0x41e/0x15e0 [ 2674.320170][ T6407] ? page_trans_huge_mapcount+0x166/0x450 [ 2674.325898][ T6407] ? pmd_pfn+0x1d0/0x1d0 [ 2674.330146][ T6407] ? lock_downgrade+0x920/0x920 [ 2674.334997][ T6407] ? swp_swapcount+0x540/0x540 [ 2674.339776][ T6407] ? do_raw_spin_unlock+0x57/0x270 [ 2674.344881][ T6407] ? __kasan_check_read+0x11/0x20 [ 2674.349905][ T6407] ? do_raw_spin_unlock+0x57/0x270 [ 2674.355015][ T6407] do_wp_page+0x499/0x14d0 [ 2674.359425][ T6407] ? finish_mkwrite_fault+0x570/0x570 [ 2674.364793][ T6407] __handle_mm_fault+0x22f1/0x3f20 [ 2674.369892][ T6407] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2674.375419][ T6407] ? __kasan_check_read+0x11/0x20 [ 2674.380433][ T6407] ? trace_hardirqs_on+0x67/0x240 [ 2674.385443][ T6407] handle_mm_fault+0x1b5/0x6b0 [ 2674.390188][ T6407] __do_page_fault+0x536/0xdd0 [ 2674.394936][ T6407] do_page_fault+0x38/0x590 [ 2674.399437][ T6407] page_fault+0x39/0x40 [ 2674.403571][ T6407] RIP: 0033:0x4309c6 [ 2674.407445][ T6407] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 9c 45 64 00 85 c0 0f 84 [ 2674.427027][ T6407] RSP: 002b:00007ffc9a3fc580 EFLAGS: 00010206 [ 2674.433072][ T6407] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 04:40:18 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:18 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x5000000) [ 2674.441022][ T6407] RDX: 000055555669d930 RSI: 00005555566a5970 RDI: 0000000000000003 [ 2674.448971][ T6407] RBP: 0000000000008041 R08: 0000000000000001 R09: 000055555669c940 [ 2674.456927][ T6407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 2674.464878][ T6407] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 2674.489836][ T6407] memory: usage 6536kB, limit 0kB, failcnt 167 [ 2674.496006][ T6407] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2674.518022][ T6407] Memory cgroup stats for /syz4: [ 2674.518113][ T6407] anon 61440 [ 2674.518113][ T6407] file 106496 [ 2674.518113][ T6407] kernel_stack 0 [ 2674.518113][ T6407] slab 6733824 [ 2674.518113][ T6407] sock 139264 [ 2674.518113][ T6407] shmem 0 [ 2674.518113][ T6407] file_mapped 0 [ 2674.518113][ T6407] file_dirty 0 [ 2674.518113][ T6407] file_writeback 0 [ 2674.518113][ T6407] anon_thp 0 [ 2674.518113][ T6407] inactive_anon 0 [ 2674.518113][ T6407] active_anon 61440 [ 2674.518113][ T6407] inactive_file 0 [ 2674.518113][ T6407] active_file 0 [ 2674.518113][ T6407] unevictable 0 [ 2674.518113][ T6407] slab_reclaimable 2838528 [ 2674.518113][ T6407] slab_unreclaimable 3895296 [ 2674.518113][ T6407] pgfault 407517 [ 2674.518113][ T6407] pgmajfault 0 [ 2674.518113][ T6407] workingset_refault 0 [ 2674.518113][ T6407] workingset_activate 0 04:40:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 2674.518113][ T6407] workingset_nodereclaim 0 [ 2674.518113][ T6407] pgrefill 265 [ 2674.518113][ T6407] pgscan 523 [ 2674.518113][ T6407] pgsteal 227 [ 2674.518113][ T6407] pgactivate 231 [ 2674.567159][ T6445] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2674.628793][ T6407] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=6407,uid=0 04:40:18 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x3, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2674.661775][ T6407] Memory cgroup out of memory: Killed process 6407 (syz-executor.4) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB [ 2674.705658][ T1057] oom_reaper: reaped process 6407 (syz-executor.4), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 2674.981010][ T6453] device nr0 entered promiscuous mode 04:40:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x3, 0xb5, 0x7fff, 0x800, 0x0, 0x8, 0x44080, 0x900eb04283d3e966, 0x7, 0x0, 0x1, 0xac, 0x6, 0x3, 0x2, 0x4, 0xffffffffffff0000, 0xfffffffffffffffa, 0x10000, 0x6, 0x900, 0xffffffffffffff63, 0x400, 0x80000001, 0x9, 0x6, 0x97, 0x3, 0x3f, 0xec, 0x100000000, 0x2, 0x4, 0x20, 0x5, 0x8000000, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7fff}, 0x80, 0x2, 0x1000, 0x6, 0xe24, 0x3, 0x5}, r2, 0xe, r1, 0x12) r3 = getpid() perf_event_open(0x0, r3, 0x7, r1, 0x0) socketpair(0xa, 0x5, 0x1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x6, 0x7, 0x9, 0x23, 0x0, 0x7, 0x8404, 0x332a0f71bc76e12a, 0x3f, 0xfc000000000, 0x0, 0x6, 0x0, 0x8001, 0x4, 0x0, 0x81, 0xf2, 0xf5, 0x2, 0xfff, 0x0, 0x80000001, 0x6, 0x3, 0x6, 0x4, 0x6, 0x3, 0x7, 0x5, 0x7ff, 0x1, 0x3, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x80}, 0xed60bc8d046d4c06, 0x80b, 0x30, 0x4, 0x3, 0x3ad, 0x10100000000}) sendmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000034c0)=[{&(0x7f00000000c0)="2e0000001900d968e65de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3e00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) 04:40:18 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x4, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2675.072000][ T6446] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2675.258857][ T6435] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x1000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x6000000) 04:40:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 2675.399020][ T6468] device nr0 entered promiscuous mode 04:40:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400932339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:19 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x5, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000015008104e00f80ecdb4cb92e0a68022c14a00207160002008e7948f328995a017c7b5851060000000100", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x2, 0x7, 0x8, 0x1, 0x0, 0x0, 0x0, 0xb, 0x804, 0x9, 0x3, 0x90d, 0x1, 0x4, 0x8, 0xfeb6, 0xff, 0x1000, 0x2, 0x0, 0x8, 0x1, 0x59e, 0x83a6, 0x2, 0x6, 0x7, 0xffffffffffffce44, 0x8001, 0x4beb, 0x5, 0x6, 0x4, 0xd751, 0x1, 0x7000000000, 0x0, 0x401, 0x8, @perf_bp={&(0x7f0000000440), 0x4}, 0x58083, 0x5, 0x6, 0x0, 0x4, 0x0, 0x2}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xf) r3 = getpid() perf_event_open(&(0x7f0000000540)={0x5, 0x70, 0x3, 0x2, 0x2, 0x7235788c, 0x0, 0x1f, 0x48088, 0x1, 0x7, 0x6, 0x8001, 0x129, 0x1, 0x0, 0x0, 0xff, 0x7, 0xb43, 0x20000, 0x6, 0xf4, 0x401, 0x4, 0x101, 0x8, 0xffffffff00000001, 0x0, 0x9, 0x8, 0x8000, 0x9, 0x800, 0x4, 0x20000000000000, 0x7f, 0x8000, 0x0, 0x9, 0x5, @perf_bp={&(0x7f0000000500), 0x8}, 0x40, 0x4, 0x1, 0x7, 0x9, 0x0, 0x18}, r3, 0x0, 0xffffffffffffffff, 0x8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000600)=0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') recvmsg(r1, &(0x7f0000000400)={&(0x7f0000000100)=@un=@abs, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)=""/140, 0x8c}, {&(0x7f0000000240)=""/209, 0xd1}], 0x2, &(0x7f0000000340)=""/144, 0x90}, 0x20) [ 2675.540546][ T6472] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x7000000) 04:40:19 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x6, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2675.666621][ T6482] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x2000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:19 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x7, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2676.044331][ T6484] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:19 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x8, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2676.147778][ T6484] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xa000000) 04:40:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 2676.239932][ T6508] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400942339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:20 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xa, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2677.208796][ T6530] IPVS: ftp: loaded support on port[0] = 21 [ 2677.281879][ T6530] chnl_net:caif_netlink_parms(): no params data found [ 2677.373927][ T6530] bridge0: port 1(bridge_slave_0) entered blocking state [ 2677.381069][ T6530] bridge0: port 1(bridge_slave_0) entered disabled state [ 2677.389812][ T6530] device bridge_slave_0 entered promiscuous mode [ 2677.397955][ T6530] bridge0: port 2(bridge_slave_1) entered blocking state [ 2677.405130][ T6530] bridge0: port 2(bridge_slave_1) entered disabled state [ 2677.414047][ T6530] device bridge_slave_1 entered promiscuous mode [ 2677.477217][ T6530] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2677.490343][ T6530] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2677.566711][ T6530] team0: Port device team_slave_0 added [ 2677.575561][ T6530] team0: Port device team_slave_1 added [ 2677.642142][ T6530] device hsr_slave_0 entered promiscuous mode [ 2677.709602][ T6530] device hsr_slave_1 entered promiscuous mode [ 2677.798418][ T6530] debugfs: Directory 'hsr0' with parent '/' already present! [ 2677.862067][ T6530] bridge0: port 2(bridge_slave_1) entered blocking state [ 2677.869141][ T6530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2677.876398][ T6530] bridge0: port 1(bridge_slave_0) entered blocking state [ 2677.883470][ T6530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2678.049914][ T6530] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2678.065919][ T8192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2678.075087][ T8192] bridge0: port 1(bridge_slave_0) entered disabled state [ 2678.082890][ T8192] bridge0: port 2(bridge_slave_1) entered disabled state [ 2678.092169][ T8192] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2678.110604][ T6530] 8021q: adding VLAN 0 to HW filter on device team0 [ 2678.176281][ T8192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2678.185558][ T8192] bridge0: port 1(bridge_slave_0) entered blocking state [ 2678.192698][ T8192] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2678.207520][ T9191] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2678.216601][ T9191] bridge0: port 2(bridge_slave_1) entered blocking state [ 2678.223680][ T9191] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2678.305974][ T8192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2678.329192][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2678.339336][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2678.349917][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2678.360705][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2678.373124][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2678.382599][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2678.392612][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2678.441119][ T6530] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2678.453089][ T6530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2678.462583][T26998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2678.473175][T26998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2678.545324][ T6530] 8021q: adding VLAN 0 to HW filter on device batadv0 04:40:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffc5}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 04:40:23 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xe000000) 04:40:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x4000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:23 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xf, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400952339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:23 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') [ 2679.510464][ T6547] __nla_validate_parse: 4 callbacks suppressed [ 2679.510473][ T6547] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2679.549710][ T6555] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:23 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x10, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xf000000) [ 2679.576660][ T6546] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2679.607755][ T6558] device nr0 entered promiscuous mode [ 2679.711239][ T6557] device lo entered promiscuous mode 04:40:23 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:23 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x18, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:23 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x8, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 04:40:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xa000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2680.209492][ T6566] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:24 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x1c, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2680.299428][ T6569] device nr0 entered promiscuous mode [ 2680.324279][ T6580] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2680.371136][ T6553] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:24 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x20000000) 04:40:24 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x8, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 04:40:24 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 2680.798650][ T6588] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400962339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:24 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x28, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x4000000008a, 0x9, 0x2}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f0000000280)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000080), &(0x7f00000000c0)=""/92}, 0x18) [ 2680.847183][ T6588] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:24 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x3f000000) 04:40:24 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018004081700d1bd", 0x2e}], 0x1}, 0x0) 04:40:24 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x3c, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xe000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:24 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 2680.997253][ T6605] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2681.024817][ T6608] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 04:40:25 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x48, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2681.254935][ T6608] device  entered promiscuous mode 04:40:25 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 2681.303338][ T6611] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:25 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x4c, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:25 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x40000000) 04:40:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400972339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="05000000000000220d58235be4e547006f50ed9accf4ad5020fc2f3c91f10700"], &(0x7f0000003ff6)='OPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x4, 0x10, &(0x7f0000000000), 0xfffffffffffffe05}, 0x14) 04:40:25 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:25 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x61, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xf000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:25 executing program 4: openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000180)={0x1, 0x0, [0x0]}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e0000001e008109e00f80ecdb4cb92e0a4824181e0cd30be8bd6efb080009000e00140013000000060005001200", 0x2e}], 0x1}, 0x0) 04:40:25 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x48000000) 04:40:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000b9beb95ebba2ecc76c0ea29b3b00000000000000000000000000000000000000afcf70dd9bec2d904af5f4536c6f6c7c11ff96e23599cd51d188709a0205e584bd0c90fe1c53943de45d2d8f725dc33d39841fc4ca2fff527ba29c20ec94a293e5ce1dc37decb61f"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$sock(0xffffffffffffffff, 0x0, 0x6) sendmsg$sock(r2, 0x0, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(0x0, r5, 0x7, r4, 0x0) r6 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r6, &(0x7f00000003c0)=r5, 0x12) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = getpid() perf_event_open(0x0, r8, 0x7, r7, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x3f, 0x1615, 0x9, 0x0, 0x80200000, 0x40000, 0x1d, 0x81, 0xfff, 0x2, 0x7fffffff, 0x4f, 0x3ff, 0xffffffffffff0001, 0x8, 0x5, 0x3b, 0x3, 0x400, 0x0, 0x2, 0x5, 0x81, 0x0, 0x10000, 0x6, 0x1, 0x2, 0x780b, 0x9, 0x401, 0x1, 0x8, 0x90, 0x4, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x3}, 0x22020, 0x40, 0x0, 0xf, 0x930c, 0x4f04, 0x10001}, r5, 0xa, r7, 0x8) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0xfffffffffffffffc, 0x0, 0x2, 0x7, 0x0, 0x81, 0x20002, 0x4, 0x6, 0x7, 0x1, 0x5, 0x2, 0x4, 0x400, 0x0, 0x0, 0x0, 0x4, 0x1ff, 0x0, 0x0, 0x1652, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0xe81c, 0x0, 0x0, 0x0, 0xfffffffffffff971, 0x3, @perf_bp={&(0x7f00000007c0)}, 0x8000, 0x4, 0x800, 0x6, 0x4, 0x0, 0x1f}, r3, 0x6, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0xd) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0xe) 04:40:25 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:25 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x63, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="85000000000000006c000000000000009540000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x100100, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f00000001c0)='veth0\x00') recvmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000180)=""/137, 0x89}, {&(0x7f00000003c0)=""/149, 0x95}, {&(0x7f0000000280)=""/40, 0x28}], 0x3}, 0xa622644020f58e99) r3 = bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) recvmsg$kcm(r1, &(0x7f0000000380)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000000340)=[{&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x2}, 0x40000041) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000040)="e8e5504676fd54f99a8ba425adc423cce7d2cba1334153da8c117985b5a86ac06d0f97ed5983a282dbf20babd5ba7856084587fd9a", 0x35}], 0x1}, 0x20004010) recvmsg$kcm(r1, &(0x7f0000006900)={&(0x7f0000006640)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000067c0)=[{&(0x7f00000066c0)=""/107, 0x6b}, {&(0x7f0000006740)=""/96, 0x60}], 0x2, &(0x7f0000006800)=""/218, 0xda}, 0x100) bpf$MAP_CREATE(0x0, &(0x7f0000006940)={0x15, 0x0, 0x8, 0x100000000, 0x2, r3, 0x5, [], r4, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000140)=r4) 04:40:25 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x68, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400982339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:26 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x4c000000) 04:40:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x3f000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:26 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x6c, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:26 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x71, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:26 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:26 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x73, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x60000000) 04:40:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x40000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:26 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e8, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x1000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, r3, 0x7, r2, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000003c0)=r3, 0x12) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x80000001, 0x7, 0xffffffffffffffff, 0x4, 0x0, 0x7, 0x619988fdf0fceef4, 0x4, 0x83, 0x6e, 0xa03, 0xffff, 0x248ec0000000000, 0x8000, 0x5, 0x1, 0xfffffffffffffffe, 0x9, 0x7, 0x4753, 0x6, 0x200, 0xc4, 0x4, 0x3, 0x100, 0x400, 0x5, 0x7ff, 0x7, 0x6, 0x7de, 0x4, 0x400, 0x7, 0x3, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4424, 0x3f, 0x4, 0x6, 0x9c, 0x5, 0x10001}, r3, 0xc, r0, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0xc0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=0x400000000000, 0x0, 0x0, 0x0, &(0x7f0000000680)={0x7, 0x1}, 0x0, 0x0, &(0x7f00000006c0)={0x5, 0x4, 0x6, 0x4}, &(0x7f0000000700)=0x6e, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=0x7}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000880)=r5, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f00000001c0)='veth0\x00') sendmsg(r6, &(0x7f0000000600)={&(0x7f0000000240)=@rc={0x1f, {0x8, 0x7f, 0x9ed7, 0xfffffffffffffffb, 0xe4a, 0x6}, 0x8}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000080)="6a7cd2690be093d0b24f8e216b344342b9b09f7b8449590dafd131b53f2e45ac3fecdd8543606deb75d4784f42774623314c5b5570cc35", 0x37}, {&(0x7f00000002c0)="f665dd0ffcdbf955e83997d8c238c1037bd4347a475f321d5654508e66d53a3b8024f1f2c6a60a7e025c7292eec38c2f21575a6a66f3a65ca234dffa4a96cb3153", 0x41}, {&(0x7f0000000340)="c45abb1b97df1c221c3c1689b9505565fc3e0f2cb06acee9d972956de9e4147259bfb4a8d2c1a7ab76974c0c624a488dfb2e2d6c8c3f4ef12b3881389e558bb6437b965ccbd5a53f641e2eb7cbb2edce59a485b591f86853", 0x58}, {&(0x7f0000000400)="518bb7b36e3e45033e50569cb45070bcef89e03be53ecf6ceedca2988b2cfcab1e33e48907b28333942f512a4bfde27ffed836f9f7c1711fa1ae9460104d9152b1473992c9efef95c69f8fb857dd652fa495003aa602d430433084452460a93c209e68c8b9f78540e53c4f3aaf44ced6726f50bd95382885c242a53b", 0x7c}, {&(0x7f0000000480)="1121d0ef9811b11ccc6aca87ab5454adbb2dabb70567883666de227b89ce5ec0b404e6761a9f263ec89341f56ff798627d270d307324222585b8", 0x3a}, {&(0x7f00000004c0)="d5cf051544805a2cfd45cdcc1b911d3e12f2205a46fc241d0e97eefdc86c221b0b0f50656591b574cc1248cf77ce875d3434829355e713980b4962f3e49ae7a903d9f474a62d419a51b59950938c125539a1c50a4a20e8c8e28af2e81405125b4268d29d3144d93204fc34f8a25a85bff3a9a244a00164f02c346d0b1ceb77ec31b31359992bbdea8f4f4548d8f52044f339b423195ea652a3ff500bec081b17aeee3f86733703eb4ca4", 0xaa}], 0x6}, 0x48800) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00000031008106e45ae087185082cf0324b0eb20000000040000dd1e986afa21d9151cd8f286f9075b50001691", 0x2e}], 0x1}, 0x400c0) 04:40:26 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:26 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x74, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400992339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x68000000) 04:40:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x60000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:26 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x7a, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:26 executing program 4: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/.et/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r1) r2 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r2, &(0x7f0000000700)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x7}, 0x80, 0x0}, 0x20004050) close(r0) setsockopt$sock_attach_bpf(r1, 0x1, 0xd, &(0x7f0000000080), 0xffffffffffffffc5) close(r1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) 04:40:27 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:27 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xfa, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:27 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='pids.current\x00', 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x110) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x6, &(0x7f0000000280)=ANY=[@ANYBLOB="18020000010000050000000000110000850000002000000095000014000000008c08aa7a47f6544d2832db8c8df6e62674c39c03243ce72b572e08682403a4a166d6f68f7aba244dbb97fa11e6cbb9d2fdfb27c982418063af0bdd2314073b5f0e291c38b50eb5cca9e8ec7e1417"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x20000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f0000001600)="2a32090e35ece66fb41fcd79a195", 0x0, 0xffffffff000003b1}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x8000, 0x0) 04:40:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x6c000000) 04:40:27 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:27 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x12c, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x74000000) [ 2683.636246][ T6773] device nr0 entered promiscuous mode 04:40:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec4009a2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x9effffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:27 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='pids.current\x00', 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x110) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x6, &(0x7f0000000280)=ANY=[@ANYBLOB="18020000010000050000000000110000850000002000000095000014000000008c08aa7a47f6544d2832db8c8df6e62674c39c03243ce72b572e08682403a4a166d6f68f7aba244dbb97fa11e6cbb9d2fdfb27c982418063af0bdd2314073b5f0e291c38b50eb5cca9e8ec7e1417"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x20000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f0000001600)="2a32090e35ece66fb41fcd79a195", 0x0, 0xffffffff000003b1}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x8000, 0x0) 04:40:27 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x1d4, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:27 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x7a000000) [ 2683.865688][ T6784] device nr0 entered promiscuous mode 04:40:27 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x20e, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xa0008000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x9effffff) 04:40:27 executing program 4: r0 = socket$kcm(0x2b, 0x2000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x88, 0x67, &(0x7f0000000140)=r1, 0x4) socket$kcm(0x11, 0x200000000000002, 0x300) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f00000001c0)=r3) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x1000000a, 0x63, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x7fffef55, 0xffffffff00000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x2}, 0x0) r4 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r4, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x0, 0xffffff7f}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280), 0xe803}], 0x1}, 0x0) r5 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r5, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x0, 0xffffff7f}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280), 0xe803}], 0x1}, 0x0) 04:40:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x9f020000) 04:40:28 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 2684.511686][ T6816] device nr0 entered promiscuous mode [ 2684.591133][ T6800] __nla_validate_parse: 26 callbacks suppressed [ 2684.591142][ T6800] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec4009b2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:28 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x25c, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) r2 = socket$kcm(0x11, 0x10000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x12, &(0x7f00000000c0)=r2, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000380)={[{0x77, 'io'}]}, 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000240)=r0, 0x4) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="006d656d6f7279085a60b688ef2317f9bc036c85087a954e07beecd08f5a0fad05ec4466ad12c6fba38fbfab4bb43810e4d8e889674e499a68175d79f29feb88a97687507e87fb8905ee9014935d309e8bf7fbfedb6e7172562a9d300823f90e9dc598451d493fb9e9c119ae6e765935e68fc04f4b7572598c26dd3c081ed9b416faa92c6a4f34e4f921fdefd8d9177fe1313a79d49d9a9aba5785947ab52b6069ddecaa9ad76953b222f4ea4fb59d294c6f688d0d3c429d144c4c54a9f6db18041c"], 0xfdef) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0xb) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000300)) 04:40:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xa0008000) 04:40:28 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xa0018000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2684.962612][ T6840] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2684.973287][ T6829] device nr0 entered promiscuous mode 04:40:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xa0018000) 04:40:28 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x25f, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2685.118267][ C1] net_ratelimit: 10 callbacks suppressed [ 2685.118272][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2685.123991][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:40:28 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xa0030000) 04:40:29 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x2ce, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2685.314410][ T6852] device nr0 entered promiscuous mode 04:40:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xa0030000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2685.451023][ T6863] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec4009c2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xf0ffffff) 04:40:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) r2 = socket$kcm(0x11, 0x10000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x12, &(0x7f00000000c0)=r2, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000380)={[{0x77, 'io'}]}, 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000240)=r0, 0x4) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="006d656d6f7279085a60b688ef2317f9bc036c85087a954e07beecd08f5a0fad05ec4466ad12c6fba38fbfab4bb43810e4d8e889674e499a68175d79f29feb88a97687507e87fb8905ee9014935d309e8bf7fbfedb6e7172562a9d300823f90e9dc598451d493fb9e9c119ae6e765935e68fc04f4b7572598c26dd3c081ed9b416faa92c6a4f34e4f921fdefd8d9177fe1313a79d49d9a9aba5785947ab52b6069ddecaa9ad76953b222f4ea4fb59d294c6f688d0d3c429d144c4c54a9f6db18041c"], 0xfdef) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0xb) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000300)) 04:40:29 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x300, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xfffff000) [ 2685.821192][ T6873] device nr0 entered promiscuous mode 04:40:29 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x3a0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2685.884715][ T6879] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2685.918266][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2685.918271][ C1] protocol 88fb is buggy, dev hsr_slave_0 04:40:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xa5000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2685.918309][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2685.924051][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2685.929849][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2685.935526][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2685.941185][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2685.946888][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:40:30 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:30 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x3fe, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xffffff7f) [ 2686.341061][ T6895] device nr0 entered promiscuous mode 04:40:30 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x500, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec4009d2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xffffff9e) 04:40:30 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) r2 = socket$kcm(0x11, 0x10000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x12, &(0x7f00000000c0)=r2, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000380)={[{0x77, 'io'}]}, 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000240)=r0, 0x4) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="006d656d6f7279085a60b688ef2317f9bc036c85087a954e07beecd08f5a0fad05ec4466ad12c6fba38fbfab4bb43810e4d8e889674e499a68175d79f29feb88a97687507e87fb8905ee9014935d309e8bf7fbfedb6e7172562a9d300823f90e9dc598451d493fb9e9c119ae6e765935e68fc04f4b7572598c26dd3c081ed9b416faa92c6a4f34e4f921fdefd8d9177fe1313a79d49d9a9aba5785947ab52b6069ddecaa9ad76953b222f4ea4fb59d294c6f688d0d3c429d144c4c54a9f6db18041c"], 0xfdef) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0xb) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000300)) 04:40:30 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x600, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xfffffff0) 04:40:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xc00e0000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2686.734533][ T6921] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:30 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x700, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2686.943985][ T6924] device nr0 entered promiscuous mode 04:40:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x3a0ffffffff) 04:40:30 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x7a2, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:30 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x40030000000000) [ 2687.304183][ T6927] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2687.336848][ T6950] device nr0 entered promiscuous mode 04:40:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec4009e2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:31 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xa00, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:31 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000640)={&(0x7f0000000080)=@ipx={0x4, 0x800, 0x80000000, "817ef8982d30", 0x5}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)="2d937f5279d1a0ddbe02210dddbeb2f684143b8f20f826687e3697af8fbb1e5f3cc850c02a5aa4b5065cd5bc30e4419b758fb1df49a3aa484964a35c6b2901ca4f333b6c0add9c758e16d8c65ab67085a40782f15e35df0796c0268d69da6d4586c43d693da30d1c20015e5df3d7ce93213526bc6d930d8f68ce713ae011ce9ab172ec590b4be2afabc5", 0x8a}, {&(0x7f0000000100)="40536aa9be7c304d9e17297e874ead3d01875d00867394cd946fd29924e884b4f74ae3f18065f39815cc7cf8b520c4d22cffece90c68b101051e54153d176a5ad80e5ad4dcd25c8d4762e7340ee4a40d8bf7cbd1440680d16a91ad8ac743694b7c816e5f8d326c0a9faefed280f5", 0x6e}, {&(0x7f00000002c0)="26c975da9d6c491c83c953cba24128d5049cd35f4514e609b7d39f6fd6645b87e1f3ee1b9e0f2fd1f9281633865b02f4b497b796eac2e474798e7bf4856f7d774cd981361747658aedee9b0a5c8c", 0x4e}, {&(0x7f0000000340)="ece253c79bbf1b79906851ed99b806ea280d35f915c1d9cfbeb957289c4ba6974856bb4808ef7036b45c92db8f26ec978d164db90a2ea859fd1a540c540c17ff965ba7407efa95d864683be4530012122643246bfb0c6ed733757742f2981b", 0x5f}], 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x238}, 0x40) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x309d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, @perf_config_ext={0x7fff}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, r3, 0x7, r2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0xe7) r4 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$kcm(0x29, 0x13c3f948a08af4d7, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = getpid() perf_event_open(0x0, r7, 0x7, r6, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000000)=0x9) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000180)) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r8, 0x0, 0x0) openat$cgroup_subtree(r8, &(0x7f0000000680)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) 04:40:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xf0ffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 2687.539307][ T6948] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2687.572674][ T6948] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:31 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xe02, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x8000a0ffffffff) [ 2687.689275][ T6962] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x8001a0ffffffff) 04:40:31 executing program 4: socket$kcm(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x28, &(0x7f00000003c0)}, 0x10) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$kcm(0xa, 0x6, 0x0) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) recvmsg$kcm(r1, &(0x7f0000000380)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000000340)=[{&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x2}, 0x40000041) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000040)="e8e5504676fd54f99a8ba425adc423cce7d2cba1334153da8c117985b5a86ac06d0f97ed5983a282dbf20babd5ba7856084587fd9a", 0x35}], 0x1}, 0x20004010) recvmsg$kcm(r1, &(0x7f0000006900)={&(0x7f0000006640)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000067c0)=[{&(0x7f00000066c0)=""/107, 0x6b}, {&(0x7f0000006740)=""/96, 0x60}], 0x2, &(0x7f0000006800)=""/218, 0xda}, 0x100) bpf$MAP_CREATE(0x0, &(0x7f0000006940)={0x15, 0x0, 0x8, 0x100000000, 0x2, r2, 0x5, [], r3, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x8, 0x0, 0xfffffffffffffff9, 0xd, 0x1fe, 0xffffffffffffffff, 0x9, [], r3, r4, 0x5, 0x3}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="55b233f8b942fcb4467b9db4d19d52b0f4b02c76bf642938ea80040986d692c62fb68d47d05ad27b5ee2beca91954d57ab6564bb3f2aa113d6844a9bcff30654dc593c831132856a028c1cf4afd2cd27668db3c47b532dc80e74d1f9420ebd8443be6ba271aea63357c8ab51cf57ff3f6b5cd826159db7bfc7fa4e4abf570c10ee52e6ab5c5f74de49e0676c3b0990dd8e2e05e7bfde0e28df189b5388f9128943ab7472a7e5aaac1a905111234bda2803216f2cbb64a5e7448dcfb61a49d62e050377b06f5cfc6af6fa46ed", &(0x7f0000000480)=""/4096}, 0x18) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000019008151e00fc00edc4cb904014865160b00014103000000000000190e000600010000000100000053b4", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r7}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000005780), 0x4) sendmsg$sock(r6, &(0x7f0000002540)={0x0, 0x0, 0x0}, 0x81) recvmsg$kcm(r6, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r8 = perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x70, 0x3, 0xff, 0x0, 0x5, 0x0, 0x0, 0x40804, 0x0, 0x9, 0x0, 0x80000000, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x1, 0x9, 0x0, 0x0, 0x3, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x8, 0x8b2c, 0x1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x2}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x9, 0x7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x9, 0x0, 0xfff, 0x7f, 0x0, 0x8, 0x40, 0xc, 0x0, 0x484d, 0x0, 0x3, 0x81, 0x8000, 0x200, 0x0, 0x9, 0x7, 0x1555, 0x26, 0x8000, 0xa7, 0x0, 0x0, 0xfffffffffffffffa, 0x9, 0x4, 0x45e, 0x0, 0x0, 0x0, 0xa, 0x4, 0x0, 0x1, 0x7, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fb}, 0x1, 0x8, 0x1, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xc, r8, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000380)) 04:40:31 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xf00, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xf0ffffffffffff) 04:40:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 2688.048445][ T6978] netlink: 'syz-executor.4': attribute type 6 has an invalid length. [ 2688.106204][ T6978] netlink: 'syz-executor.4': attribute type 6 has an invalid length. [ 2688.155410][ T6968] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec4009f2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x100000000000000) 04:40:32 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x1800, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="19000000140081ff00002c000500cf182897f09730af000500", 0x19}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 04:40:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xfffff000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:32 executing program 4: r0 = socket$kcm(0x2, 0x6, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r2, 0x29, 0x36, &(0x7f0000000200)=r2, 0x2e8) sendmsg$kcm(r2, &(0x7f0000000100)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local, 0x5}, 0x80, 0x0}, 0x20000000) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=""/208, 0xd0}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) socket$kcm(0x10, 0x800000000002, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f00000001c0)='veth0\x00') sendmsg$kcm(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000280)}, 0x20000000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) sendmsg(r2, &(0x7f00000003c0)={0x0, 0xaa67a3055d2ea9e3, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x10}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x1) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da802004d180600, 0x500001c) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x101a02, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) getpid() bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000)=r4, 0x4) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, 0x0, 0x0) 04:40:32 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x1c00, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x200000000000000) 04:40:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:32 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x2000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xffffff7f, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400a02339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x300000000000000) 04:40:32 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x2800, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:32 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x2c01, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x400000000000000) 04:40:33 executing program 4: socket$kcm(0x2, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x120000000003, 0x11) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000f80)={0x4, 0x70, 0x0, 0xde9, 0x3, 0x6, 0x0, 0x3, 0x800, 0x4, 0x3, 0x8001, 0x8, 0x80000000, 0x80000001, 0xfff, 0x4, 0x3ff, 0x800, 0xffffffff, 0xff, 0x5, 0x1, 0x101, 0x80000000, 0x200, 0xffffffff00000001, 0x1000, 0xfffffffffffffffe, 0x10001, 0x21, 0x7, 0x4, 0x10000, 0x9, 0x7, 0x100000001, 0x100000000, 0x0, 0x1ff, 0x4, @perf_config_ext={0x7}, 0x80, 0x8, 0x5, 0x0, 0x1, 0x8, 0x6}, r1, 0xc, r0, 0xe) socket$kcm(0x29, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0xffffffff80000001, 0x0, 0x0, 0x1c5}, 0x3c) r3 = socket$kcm(0x10, 0x40000000000002, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x0) sendmsg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000001100)="5bb4d9557e2ef9a8f7df7c0af1270ca8fe2dd116cb553e8cef462f0ea7dbbeb4ca2219c74dbe9c15dfcd5f7ab338e37d00bfa20fd2bdc6c0f3f0d4db8914d9d9a0f55b72b47256dfab7ec72186e88696ab9978b08c46d14c638f16ac96121c25bd2da46cc3b0f11c4349", 0x6a}, {&(0x7f0000000140)="f01dcc0202b380146e9bea125c28c1c6cee5faab053505a2a0beb5dd99d08baa748fac995ecda72259e9cd6ed8c38617c13853a438b53154eb74c7172c09d19e788cbe8cf4a4dbfbc6fda3b9e71baf7098488c4be7787706ad6ef1599fc619662131346754a5932b0f8080af255b", 0x6e}, {&(0x7f0000001000)="c0cf2cca7100ac0d27ca5da7d22d3714629d8f3e524ef68ffb689a19cd4056fe9f0445d0a357504441d9bdfc67109cc7763c4b9a9f4882373b1a0bf8ab447e3b7f7ca6ac04b1335a6fed38e707621b1d28af0806073b3f5d30a2691b2d4aa329cda38f86c1c7f31a27c0ca53774928fc353dd3", 0x73}, {&(0x7f0000001200)="469f81da8527532e7fc6a4711815738ef2cb892e016dd42af29b6d6bf6683fc88751afcbb4dad010fbb4ed7abcd7cefe3ca83e787f6526e291b67ea13018b7e0c06842ed69868c5a1e45536a0c0412c8a5cb2b08f799440118407771e052c5", 0x5f}, {&(0x7f0000001280)="d51330703102d8f78005abb18a0e35ebb2458e4c70afbb532500073c5c0aad38fd7a6a5ed31cd77e31d7dc35fabb0c09c726469312f252a5ce71157ad20ad407c2011fdcd6cbd52ff4dfa880655ff6f4bdcd7f", 0x53}], 0x5}, 0x20000000) socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f0000003040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xfe3d, &(0x7f0000003100), 0x0, &(0x7f0000003140)=""/29, 0x1d}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000040)={&(0x7f0000000200)=@sco, 0x26c, &(0x7f0000002b80), 0x218, &(0x7f00000076c0)=""/156, 0xfffffffffffffe11, 0xfffffffffffffffa}, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000010c0), 0xc) recvmsg(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x287d000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000013c0)='tasks\x00') bpf$OBJ_GET_MAP(0x7, 0x0, 0xffffffffffffffde) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r5, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) 04:40:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xffffff9e, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:33 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x3c00, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:33 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x500000000000000) 04:40:33 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x3f00, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2689.643750][ T7065] __nla_validate_parse: 14 callbacks suppressed [ 2689.643758][ T7065] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2689.644819][ T7068] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2689.734502][ T7069] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400a12339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xfffffff0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) 04:40:33 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x4000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:33 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x600000000000000) 04:40:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x3c) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x24, 0x4, 0x1, 0x4, r0, 0xa14d}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8105, 0x0, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(0x0, r5, 0x7, r4, 0x0) r6 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r6, &(0x7f00000003c0)=r5, 0x12) close(r6) sendmsg$tipc(r3, &(0x7f0000001880)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x3, 0x3}}, 0x10, &(0x7f00000017c0)=[{&(0x7f0000000200)="2f8ff8b948113590bc1eb346864a2ba694cc66de98e3aaeb8d213ad7981468ea9b31e5f5dc42ce4f7d7de0b66c55d02b76a255701572bb0533621e836a97cf4eb778525a6e2faaaffb7a96a6829c5cb70e28335a9331cde0f54a570ea2cc", 0x5e}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="fdb0fe816ac0a5f77d3d133a51e3cfa4573b70eb7007db0d616afea804dd68b6bdf4842c5dfac7eb3a02b3d0da9ec139ed426fe280183585a7b36933f91d1517200b5624ee2288cf95d871861bed7eb5c83445e91b1a7bb76bca373221ffa005bf2363d78d99f48e093f322346027772460e2cd160b04a950f560e4abb6ff2080d74cbff41316ecbe3e34b320225e641dd897a90eea827605941ec7aea5e3f6aa10a2f0e8888e6452268fa50630458f47159005fe9c515c8a578940a71719a3c0fbaf2e72a2f2d688922b55156de6e3cda25d83a9ce97c", 0xd7}, {&(0x7f0000001380)="a097cc253bede4b6c8286ece29c03eb37bc1614d08702fec32fe025d2c0bc8d0a2ca6645c442b0929123047d9348206e2dfda3bc6552927c4b079a716be1314d94ee4689085a1acfb2b44382aee68329effd9fd88509747671fee0e9d3a100286d523eecab5cdccc3ca31a8f7a79eace7268992f3578c9b2f30ab1e933b87a39f9b32156042094143b43a247259b1c5a5817beb77aafe7a90d93196293a8d3c6979ca6d005b4b17fb7b5791a1ac420ecc7e1aac054d47de8cdc7d393c6cc2cc718331dec", 0xc4}, {&(0x7f0000001480)="0d8a7de3a08283548339bcbecdc8b732f3bfec59171ed473d04c35cdeb8294847c493f8b362b76743d6c6aa3ba0e3a2929987b79ed881818e52005a764afafce24d47edd88a24753f59ef7258b", 0x4d}, {&(0x7f0000001500)="0c743612d98a3e32eacf32650f96c949baabb0da81078930a315c61e8fc145acd1aff2d65574136a434bb818dce216265befd13e4b335392c05a35d77a731bd74bcd1eb60474c18ed90aa246eb6faaff0332a858c6e230984ec34c60e58a0af0a2f4defac8fd1ad59cb088b0a5073329c7335dca57e1b0f58d744a97f0fa5b5b0500ab4a7e5587061a035cf4276d37a46bd56a8ee04dcdab8697723b6709f3f7216238cdaea0c278891fc1fec0d775e0d30dbbe95b635ba49d4d33209ba23aab93f7a5975f58ee4e8bb65abb5fd287da96cb4d854da62813a6f49337445dc8a2b14ea9f0d5cb3bcc838728d995c31baff528daade8b96cfb6417222a8d", 0xfd}, {&(0x7f00000000c0)="48b5c32605e8fb893f70895664f58a0d2c1afdbff81faca62d3b3236bd04082249199575ef4aad01c4ad8738b9cbd1ff9eb9da2204befe3520", 0x39}, {&(0x7f0000001600)="8618bc3cff968bbabb2779183258275a126858d29f743becdfc5b374099a6cf04e5b9f973202340584d1aa003b182a9225273b9d81c5f95b8e111d89029a544515f89aaf74cececf363813fd897bbad4a04a152b0dba432ef964d9b0f618a3347a30e1ad166ab55461824ef518d8d55ee7c4e5bf34c57cc748288a90eaf2b9f03338a128d3ddbfa51c13dd959e506e8a25bc374fe6d69a", 0x97}, {&(0x7f00000016c0)="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", 0xfa}], 0x9, &(0x7f0000000180)="86cd086b09e8e75f8581173d4f9221184344008f4b03", 0x16, 0x4}, 0x4000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x2a6) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r2, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r2, &(0x7f0000000040)}, 0x10) [ 2689.875244][ T7085] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:33 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x4800, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:33 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x700000000000000) [ 2689.938650][ T7093] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2689.959640][ T7097] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x3a0ffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x10001) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={0x0, r0}, 0x10) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r2, 0x0, 0x0) r5 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r5, 0x15, 0x0, 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 04:40:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) [ 2690.145116][ T26] audit: type=1804 audit(1568349633.885:122): pid=7107 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir828393399/syzkaller.kn4iDH/25/memory.events" dev="sda1" ino=16562 res=1 04:40:34 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x4c00, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2690.272666][ T26] audit: type=1804 audit(1568349634.015:123): pid=7113 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir828393399/syzkaller.kn4iDH/25/memory.events" dev="sda1" ino=16562 res=1 [ 2690.330730][ T26] audit: type=1804 audit(1568349634.045:124): pid=7107 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir828393399/syzkaller.kn4iDH/25/memory.events" dev="sda1" ino=16562 res=1 [ 2690.382707][ T7109] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2690.405132][ T7119] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2690.566549][ T7090] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400a22339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:34 executing program 4: r0 = getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, r3, 0x7, r2, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x3f, 0xfffffffffffffff8, 0x7, 0x6, 0x0, 0x4, 0x40804, 0x8, 0x8, 0x1, 0x200000, 0x400, 0x7f, 0x9, 0x8, 0xb22, 0x9c, 0x3, 0x8, 0x4, 0x40, 0xffff, 0xffffffffffff0000, 0x6, 0xfffffffffffffff8, 0x1, 0x0, 0x5, 0x5, 0x7a7, 0x22, 0x9, 0xff, 0x0, 0x80, 0xffffffff, 0x0, 0x73e, 0x1, @perf_config_ext={0x6b, 0x3}, 0x40, 0x1, 0x1, 0x4, 0x120000000, 0x7, 0xffffffffffffffe2}, r0, 0xc, r2, 0x3) close(0xffffffffffffffff) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xffffff7f, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880316fb0a000200060ada1b40d805000300c50083b8", 0x2e}]}, 0x0) 04:40:34 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x5c02, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:34 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) 04:40:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xa00000000000000) 04:40:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x40030000000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:34 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x28}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x2, 0x7, 0xb0b, 0x4, r1, 0x7fffffff, [], 0x0, r2}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 04:40:34 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x5f02, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2690.827880][ T7135] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xe00000000000000) 04:40:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x8000a0ffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:34 executing program 0 (fault-call:5 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 2691.109985][ T7158] FAULT_INJECTION: forcing a failure. [ 2691.109985][ T7158] name failslab, interval 1, probability 0, space 0, times 0 [ 2691.128754][ T7158] CPU: 0 PID: 7158 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2691.136578][ T7158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2691.146628][ T7158] Call Trace: [ 2691.149919][ T7158] dump_stack+0x172/0x1f0 [ 2691.154254][ T7158] should_fail.cold+0xa/0x15 [ 2691.158845][ T7158] ? fault_create_debugfs_attr+0x180/0x180 [ 2691.164650][ T7158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2691.170889][ T7158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2691.177123][ T7158] ? debug_smp_processor_id+0x3c/0x214 [ 2691.182587][ T7158] ? ___might_sleep+0x163/0x280 [ 2691.187448][ T7158] __should_failslab+0x121/0x190 [ 2691.192392][ T7158] should_failslab+0x9/0x14 [ 2691.196894][ T7158] __kmalloc+0x2e0/0x770 [ 2691.201128][ T7158] ? mark_held_locks+0xf0/0xf0 [ 2691.205883][ T7158] ? _parse_integer+0x190/0x190 [ 2691.210728][ T7158] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2691.216443][ T7158] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2691.221983][ T7158] ? tomoyo_path_number_perm+0x193/0x520 [ 2691.227610][ T7158] tomoyo_path_number_perm+0x1dd/0x520 [ 2691.233057][ T7158] ? tomoyo_path_number_perm+0x193/0x520 [ 2691.238693][ T7158] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2691.244492][ T7158] ? perf_trace_lock_acquire+0xf5/0x530 [ 2691.250035][ T7158] ? __kasan_check_read+0x11/0x20 [ 2691.255070][ T7158] ? __fget+0x384/0x560 04:40:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000020000000000000000000000090100000000000000010000040000000200000000020000000000000000300000612e00"], &(0x7f0000004600)=""/210, 0x4f, 0x193, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r1, 0x0, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) recvmsg$kcm(r1, &(0x7f0000000380)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000000340)=[{&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x2}, 0x40000041) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000040)="e8e5504676fd54f99a8ba425adc423cce7d2cba1334153da8c117985b5a86ac06d0f97ed5983a282dbf20babd5ba7856084587fd9a", 0x35}], 0x1}, 0x20004010) recvmsg$kcm(r1, &(0x7f0000006900)={&(0x7f0000006640)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000067c0)=[{&(0x7f00000066c0)=""/107, 0x6b}, {&(0x7f0000006740)=""/96, 0x60}], 0x2, &(0x7f0000006800)=""/218, 0xda}, 0x100) bpf$MAP_CREATE(0x0, &(0x7f0000006940)={0x15, 0x0, 0x8, 0x100000000, 0x2, r2, 0x5, [], r3, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg(r5, &(0x7f0000000280)={&(0x7f0000000180)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2}, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80, &(0x7f0000000200)=[{&(0x7f00000003c0)="905e9c49389ab9af87aa46cd41060032c97a17dd59e96bcf0d0479a1979bfa8f2551666a71c96621dcb4584630bf610637ec952f3e57e17cbbddea48f4e112a35da2f952a6c428cf77eaa877144002e3b31bb9b75f85e4e2aa1fe8cec0d199a1a3ae9a2a609e0f", 0x67}], 0x1, &(0x7f0000000600)=[{0xd8, 0x0, 0x10000, "72b757dfc0b191a3f527d594ba8e15b6d9c3417eb34889bb02903bf4cff58886edde6d5ecadaaa42c8dae8785547681f304a9af59c7c00b0370a23488307a0d60996a815cc552d6c2f936168da6ae7a05e3fbc331667476ea283e41593da5c0ef4edf5c422da63e4fded3fcde2fc366827a9151616bc24fd736529dac355ecb4be92f6c94e98d40c42284bf8ca0ebed6353383f37682e61687d55a4024caa6f3793c00e94dfa50ec4cb7891759538f0aa372d17d6f7e71550194777077315338d1952b15f1"}, {0xd0, 0x112, 0x5, "6922061fa79d95126a17111b9eced6c9e1d5a6bb0380597eb5455de26b7c49283a3728a25626474e8245c45fc8f50041984901c42c3efb6e8b59cf610b34763c9a423e32cec849bcee0393af55788fecb6837add126e7ac8c66650a08e2797b19415531e55cf0cfbf1c8936628d750ca10a70803c2b67ec887cdcaca07eaf786ed51bcaca9d23f6294f9c20d405739800c0873b14e39c520111e8eb37c44b6c1fffeb0e057f5c371c572024d96e2aad9ed170268b166603d6fdc3cabac"}, {0x20, 0x103, 0x3, "2d878ac378feaa8ded44eb88a6"}], 0x1c8}, 0x10) write$cgroup_subtree(r4, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x7, 0x6, 0x5, 0x80, r0, 0x7, [], r3, r4, 0x2, 0x1}, 0x3c) [ 2691.259228][ T7158] ? ksys_dup3+0x3e0/0x3e0 [ 2691.263633][ T7158] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2691.269871][ T7158] ? fput_many+0x12c/0x1a0 [ 2691.274282][ T7158] tomoyo_file_ioctl+0x23/0x30 [ 2691.279044][ T7158] security_file_ioctl+0x77/0xc0 [ 2691.283985][ T7158] ksys_ioctl+0x57/0xd0 [ 2691.288353][ T7158] __x64_sys_ioctl+0x73/0xb0 [ 2691.292950][ T7158] do_syscall_64+0xfd/0x6a0 [ 2691.297472][ T7158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2691.303358][ T7158] RIP: 0033:0x4598e9 [ 2691.307255][ T7158] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2691.326854][ T7158] RSP: 002b:00007f3dbc1bfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2691.335266][ T7158] RAX: ffffffffffffffda RBX: 00007f3dbc1bfc90 RCX: 00000000004598e9 [ 2691.343236][ T7158] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 2691.351202][ T7158] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 2691.359168][ T7158] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc1c06d4 [ 2691.367136][ T7158] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 [ 2691.385984][ T7158] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2691.422414][ T7158] device nr0 entered promiscuous mode 04:40:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400a32339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:35 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x6100, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='mem\x85ry.current\x85\xefJ\xa9\xfb\x00\xf1f\xa3\x14\xdf\xba\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r3, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000000)={0x0, 0xffffffffffffffff}, 0x0}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='keyringselfeth1#\x00', r3}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x202001, 0x0) r4 = gettid() perf_event_open(&(0x7f0000002b40)={0x0, 0xfe3a, 0x3, 0x7fffffff, 0x0, 0x0, 0x0, 0x9, 0x8000, 0x8, 0x81, 0x1, 0x60, 0x80000001, 0xffffffff, 0x3e40040, 0x1, 0x0, 0x4, 0x4, 0x5, 0x4, 0x80000000, 0x78, 0x1, 0x5, 0x7d, 0x1, 0x100000001, 0xff, 0x0, 0x200000100000001, 0x5, 0x4, 0x1, 0x0, 0xffffffff, 0x800000000000200, 0x0, 0x9, 0x0, @perf_bp={0x0, 0xb}, 0x800, 0x200, 0x1, 0xf, 0x3, 0x1, 0x5}, r4, 0xc, 0xffffffffffffffff, 0x9) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) close(r1) r5 = openat$cgroup_ro(r0, &(0x7f0000000400)='io.stat\x00', 0x0, 0x0) r6 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) openat$cgroup_type(r6, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000680)={&(0x7f0000000140)='./file1/file0\x00', 0x0, 0x10}, 0xffffffffffffff01) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = getpid() perf_event_open(0x0, r8, 0x7, r7, 0x0) r9 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r9, &(0x7f00000003c0)=r8, 0x12) r10 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = getpid() perf_event_open(0x0, r11, 0x7, r10, 0x0) r12 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r12, &(0x7f00000003c0)=r11, 0x12) r13 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_type(r13, 0x0, 0x2, 0x0) r14 = getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffff9c, 0xc0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, &(0x7f0000000480)={0x1, 0x2}, 0x0, 0x0, &(0x7f00000005c0)={0x3, 0x6, 0x401, 0x5}, &(0x7f0000000600)=0x1010000000000, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r14, r13, 0x0, 0x2, &(0x7f0000000400)='.\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r11, r5, 0x0, 0x22, &(0x7f0000000240)=',security[userposix_acl_access.]-\x00', r15}, 0x30) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x6, 0x0, 0x3ff, 0x40, 0x0, 0x2, 0x9002, 0x6, 0xe00000000000000, 0x1ff, 0x7fff, 0x8, 0x100000000, 0x101, 0xdb8, 0x4, 0x2, 0x9, 0x6a40d0fd, 0x4, 0x5, 0x2, 0x800, 0x9, 0x0, 0x7fffffff, 0x7fffffff, 0x6, 0x8, 0xf4b1003, 0xbc2, 0x2d65, 0x2, 0x5, 0x2, 0x100, 0x0, 0x89, 0x4, @perf_bp={&(0x7f0000000180), 0x2}, 0x1040, 0x5, 0xc0a, 0x9, 0x396, 0x1, 0x5e0ce0cf}, r8, 0xffffffffffffffff, r16, 0x6) r17 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\xff', 0x100401, 0x0) write$cgroup_type(r17, &(0x7f0000000080)='threaded\x00', 0xffffffd5) 04:40:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x8001a0ffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xf00000000000000) 04:40:35 executing program 0 (fault-call:5 fault-nth:1): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 2691.896668][ T7181] FAULT_INJECTION: forcing a failure. [ 2691.896668][ T7181] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2691.909896][ T7181] CPU: 1 PID: 7181 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2691.917690][ T7181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2691.927737][ T7181] Call Trace: [ 2691.931023][ T7181] dump_stack+0x172/0x1f0 [ 2691.935359][ T7181] should_fail.cold+0xa/0x15 [ 2691.939958][ T7181] ? fault_create_debugfs_attr+0x180/0x180 04:40:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x2000000000000000) 04:40:35 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x6300, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2c, 0x3, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) openat$cgroup(r1, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, r3, 0x7, r2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5aef) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0xa07c4362ffe688d4}, 0xffffffffffffff8c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r4, 0x0, 0xb2, 0xf4, &(0x7f00000000c0)="2e1c63a02eeeca57b14ece44b59a368d720ff08acb2ae15b24c10185f5e02f6a83c7447519d898cb78c12767698ee29fba66830fef94022fec9c49f1f68996da46c1d7a2e0b8f1fdb6409250ea65632d40e96380c6f35dbbc1a25e30ccd49a9205db48d0167b87cc6f4846a3bc7cb4e31f448028c556154014505642c84aeab58ca2bb1783e1e67d4ff4794c7d015100ff70a3a0b3d038503fc03285442f99f1dd44a0ef3b2930b9301fc3c9790eb44c409d", &(0x7f0000000200)=""/244, 0x1f}, 0x28) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000040)='&@[\x00') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') socket$kcm(0x2, 0x0, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x1f425dfc37c6ba49) socket$kcm(0x29, 0x0, 0x0) [ 2691.945793][ T7181] ? lock_downgrade+0x920/0x920 [ 2691.950649][ T7181] should_fail_alloc_page+0x50/0x60 [ 2691.955848][ T7181] __alloc_pages_nodemask+0x1a1/0x900 [ 2691.961222][ T7181] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2691.966938][ T7181] ? kernel_text_address+0x73/0xf0 [ 2691.972062][ T7181] ? unwind_get_return_address+0x61/0xa0 [ 2691.977688][ T7181] ? profile_setup.cold+0xbb/0xbb [ 2691.982714][ T7181] ? fault_create_debugfs_attr+0x180/0x180 [ 2691.988523][ T7181] cache_grow_begin+0x90/0xd20 [ 2691.993282][ T7181] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2691.999003][ T7181] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2692.005247][ T7181] __kmalloc+0x6b2/0x770 [ 2692.009493][ T7181] ? mark_held_locks+0xf0/0xf0 [ 2692.014261][ T7181] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2692.019971][ T7181] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2692.025505][ T7181] ? tomoyo_path_number_perm+0x193/0x520 [ 2692.031126][ T7181] tomoyo_path_number_perm+0x1dd/0x520 [ 2692.036567][ T7181] ? tomoyo_path_number_perm+0x193/0x520 [ 2692.042180][ T7181] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2692.047964][ T7181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2692.054205][ T7181] ? __kasan_check_read+0x11/0x20 [ 2692.059215][ T7181] ? __fget+0x384/0x560 [ 2692.063360][ T7181] ? ksys_dup3+0x3e0/0x3e0 [ 2692.067752][ T7181] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2692.073968][ T7181] ? fput_many+0x12c/0x1a0 [ 2692.078366][ T7181] tomoyo_file_ioctl+0x23/0x30 [ 2692.083130][ T7181] security_file_ioctl+0x77/0xc0 [ 2692.088056][ T7181] ksys_ioctl+0x57/0xd0 [ 2692.092194][ T7181] __x64_sys_ioctl+0x73/0xb0 [ 2692.096770][ T7181] do_syscall_64+0xfd/0x6a0 [ 2692.101257][ T7181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2692.107128][ T7181] RIP: 0033:0x4598e9 [ 2692.111008][ T7181] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2692.130590][ T7181] RSP: 002b:00007f3dbc201c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2692.138981][ T7181] RAX: ffffffffffffffda RBX: 00007f3dbc201c90 RCX: 00000000004598e9 [ 2692.146929][ T7181] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 2692.154879][ T7181] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2692.162827][ T7181] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc2026d4 [ 2692.170774][ T7181] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 [ 2692.253779][ T7181] device nr0 entered promiscuous mode 04:40:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xf0ffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:36 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x6800, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x3f00000000000000) 04:40:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400a42339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x100000000000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:36 executing program 0 (fault-call:5 fault-nth:2): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x4000000000000000) 04:40:36 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x6c00, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2693.087961][ T7231] FAULT_INJECTION: forcing a failure. [ 2693.087961][ T7231] name failslab, interval 1, probability 0, space 0, times 0 04:40:36 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x7100, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x200000000000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:36 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000280)=0x5982, 0x12) [ 2693.166058][ T7231] CPU: 1 PID: 7231 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2693.173904][ T7231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2693.183952][ T7231] Call Trace: [ 2693.187239][ T7231] dump_stack+0x172/0x1f0 [ 2693.187264][ T7231] should_fail.cold+0xa/0x15 [ 2693.196152][ T7231] ? fault_create_debugfs_attr+0x180/0x180 [ 2693.201964][ T7231] ? ___might_sleep+0x163/0x280 [ 2693.206858][ T7231] __should_failslab+0x121/0x190 [ 2693.211797][ T7231] should_failslab+0x9/0x14 [ 2693.216299][ T7231] __kmalloc+0x2e0/0x770 [ 2693.220541][ T7231] ? snprintf+0xbb/0xf0 [ 2693.224698][ T7231] ? vsprintf+0x40/0x40 [ 2693.228854][ T7231] ? tomoyo_encode2.part.0+0xf5/0x400 [ 2693.234232][ T7231] tomoyo_encode2.part.0+0xf5/0x400 [ 2693.239425][ T7231] tomoyo_encode+0x2b/0x50 [ 2693.243830][ T7231] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 2693.249456][ T7231] ? tomoyo_path_number_perm+0x193/0x520 [ 2693.255082][ T7231] tomoyo_path_number_perm+0x1dd/0x520 [ 2693.260524][ T7231] ? tomoyo_path_number_perm+0x193/0x520 [ 2693.266152][ T7231] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2693.271944][ T7231] ? perf_trace_lock_acquire+0xf5/0x530 [ 2693.277486][ T7231] ? __kasan_check_read+0x11/0x20 [ 2693.282514][ T7231] ? __fget+0x384/0x560 [ 2693.286753][ T7231] ? ksys_dup3+0x3e0/0x3e0 [ 2693.291167][ T7231] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2693.297393][ T7231] ? fput_many+0x12c/0x1a0 [ 2693.301801][ T7231] tomoyo_file_ioctl+0x23/0x30 [ 2693.306553][ T7231] security_file_ioctl+0x77/0xc0 [ 2693.311480][ T7231] ksys_ioctl+0x57/0xd0 [ 2693.315624][ T7231] __x64_sys_ioctl+0x73/0xb0 [ 2693.320204][ T7231] do_syscall_64+0xfd/0x6a0 [ 2693.324711][ T7231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2693.330587][ T7231] RIP: 0033:0x4598e9 [ 2693.334476][ T7231] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2693.354062][ T7231] RSP: 002b:00007f3dbc1e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2693.362456][ T7231] RAX: ffffffffffffffda RBX: 00007f3dbc1e0c90 RCX: 00000000004598e9 [ 2693.370409][ T7231] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 2693.378367][ T7231] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2693.386319][ T7231] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc1e16d4 [ 2693.394271][ T7231] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 04:40:37 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000280)=0x5982, 0x12) [ 2693.448421][ T7231] ERROR: Out of memory at tomoyo_realpath_from_path. 04:40:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x894c, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000000)="ed90408002e8f76cbb01721d98c569d68dfa1fd0aff256c754ebfc5f5355", &(0x7f0000000040)="c0b7f27d8e7563ec9e9f2cf979ee82fed245d24b44f00ad4eb37ee813379b8a3a95a04b65276ce48c1594c887c86563c1e17"}, 0x20) 04:40:37 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x7300, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2693.603210][ T7231] device nr0 entered promiscuous mode 04:40:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x4800000000000000) 04:40:37 executing program 0 (fault-call:5 fault-nth:3): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400a52339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:37 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3ff, 0xdfd, 0x0, 0x0, 0xda8, 0x0, 0x80000001, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7, 0x0, 0x376, 0xfffffffffffffffe, 0x0, 0x0, 0x8, 0x3, 0x0, 0xfff, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='cgroup.stat\x00', 0x0, 0x0) recvmsg(r1, &(0x7f0000004b00)={0x0, 0x0, &(0x7f0000004a40)=[{0x0}, {&(0x7f0000004940)=""/214, 0xd6}], 0x2, &(0x7f0000004a80)=""/68, 0x44}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004b40)={0xf, 0x0, 0x10000, 0x8001, 0x40, r1, 0x3, [], 0x0, r1, 0x3, 0x1}, 0x3c) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"], 0x17e}, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$cgroup_ro(r2, &(0x7f0000000140)='cgroup.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000380)='/group.stat\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0x0, 0x0, 0x1}, 0x2c) r4 = openat$cgroup_ro(r1, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(r3) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x4) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) r6 = openat$cgroup_ro(r4, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r7, 0x0, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r8, 0x2405, r6) perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0xbb0b, 0x57c1, 0x6, 0xfff, 0x0, 0x0, 0x0, 0x3, 0x3, 0x3, 0x7fffffff, 0x0, 0x1ff, 0x0, 0x6, 0x8340, 0x0, 0x7, 0x0, 0x1, 0x8, 0x593, 0xfffffffffffff000, 0x7, 0x4, 0x9, 0x400000, 0x5, 0x8001, 0x2, 0x0, 0x0, 0x2, 0x3ff, 0x7fff, 0x9, 0x0, 0x8734, 0x1, @perf_bp={0x0, 0x6}, 0x2002, 0x0, 0x8, 0x8, 0x5, 0x6, 0x800}, 0x0, 0x8, 0xffffffffffffffff, 0xa) 04:40:37 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x7400, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x400000000000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x4c00000000000000) 04:40:37 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x7a00, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2694.109560][ T7274] FAULT_INJECTION: forcing a failure. [ 2694.109560][ T7274] name failslab, interval 1, probability 0, space 0, times 0 [ 2694.130615][ T7274] CPU: 0 PID: 7274 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2694.138435][ T7274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2694.148479][ T7274] Call Trace: [ 2694.151762][ T7274] dump_stack+0x172/0x1f0 [ 2694.156089][ T7274] should_fail.cold+0xa/0x15 [ 2694.160674][ T7274] ? fault_create_debugfs_attr+0x180/0x180 [ 2694.166468][ T7274] ? page_to_nid.part.0+0x20/0x20 [ 2694.171485][ T7274] ? ___might_sleep+0x163/0x280 [ 2694.176322][ T7274] __should_failslab+0x121/0x190 [ 2694.181246][ T7274] should_failslab+0x9/0x14 [ 2694.185747][ T7274] kmem_cache_alloc_node_trace+0x274/0x750 [ 2694.191539][ T7274] ? lock_downgrade+0x920/0x920 [ 2694.196389][ T7274] __kmalloc_node+0x3d/0x70 [ 2694.200881][ T7274] qdisc_alloc+0xbb/0xa90 [ 2694.205195][ T7274] ? __kasan_check_write+0x14/0x20 [ 2694.210294][ T7274] qdisc_create_dflt+0x78/0x1e0 [ 2694.215133][ T7274] dev_activate+0x6f6/0xb30 [ 2694.219640][ T7274] __dev_open+0x2b8/0x3f0 [ 2694.223956][ T7274] ? dev_set_rx_mode+0x40/0x40 [ 2694.228709][ T7274] ? __local_bh_enable_ip+0x15a/0x270 [ 2694.234069][ T7274] __dev_change_flags+0x565/0x6e0 [ 2694.239081][ T7274] ? dev_set_allmulti+0x30/0x30 [ 2694.243915][ T7274] ? security_file_ioctl+0x77/0xc0 [ 2694.249005][ T7274] ? ksys_ioctl+0x57/0xd0 [ 2694.253315][ T7274] ? __x64_sys_ioctl+0x73/0xb0 [ 2694.258069][ T7274] ? mutex_lock_io_nested+0x1260/0x1260 [ 2694.263599][ T7274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2694.269823][ T7274] dev_change_flags+0x92/0x170 [ 2694.274569][ T7274] dev_ifsioc+0x2aa/0xa00 [ 2694.278879][ T7274] ? full_name_hash+0xc0/0x100 [ 2694.283625][ T7274] ? register_gifconf+0x70/0x70 [ 2694.288465][ T7274] dev_ioctl+0x1b2/0xc68 [ 2694.292694][ T7274] sock_do_ioctl+0x1b7/0x2f0 [ 2694.297269][ T7274] ? compat_ifr_data_ioctl+0x160/0x160 [ 2694.302714][ T7274] ? trace_hardirqs_on+0x67/0x240 [ 2694.307728][ T7274] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2694.313951][ T7274] ? tomoyo_path_number_perm+0x263/0x520 [ 2694.319569][ T7274] sock_ioctl+0x3ed/0x780 [ 2694.323882][ T7274] ? dlci_ioctl_set+0x40/0x40 [ 2694.328543][ T7274] ? __kasan_check_read+0x11/0x20 [ 2694.333552][ T7274] ? dlci_ioctl_set+0x40/0x40 [ 2694.338214][ T7274] do_vfs_ioctl+0xdb6/0x13e0 [ 2694.342786][ T7274] ? ioctl_preallocate+0x210/0x210 [ 2694.347875][ T7274] ? __fget+0x384/0x560 [ 2694.352017][ T7274] ? ksys_dup3+0x3e0/0x3e0 [ 2694.356425][ T7274] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2694.362645][ T7274] ? fput_many+0x12c/0x1a0 [ 2694.367069][ T7274] ? tomoyo_file_ioctl+0x23/0x30 [ 2694.372003][ T7274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2694.378233][ T7274] ? security_file_ioctl+0x8d/0xc0 [ 2694.383336][ T7274] ksys_ioctl+0xab/0xd0 [ 2694.387481][ T7274] __x64_sys_ioctl+0x73/0xb0 [ 2694.392060][ T7274] do_syscall_64+0xfd/0x6a0 [ 2694.396556][ T7274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2694.402432][ T7274] RIP: 0033:0x4598e9 [ 2694.406314][ T7274] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2694.425911][ T7274] RSP: 002b:00007f3dbc201c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2694.434304][ T7274] RAX: ffffffffffffffda RBX: 00007f3dbc201c90 RCX: 00000000004598e9 [ 2694.442276][ T7274] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 2694.450234][ T7274] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:40:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x6000000000000000) [ 2694.458197][ T7274] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc2026d4 [ 2694.466162][ T7274] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 [ 2694.500709][ T7274] nr0: activation failed [ 2694.505373][ T7274] device nr0 entered promiscuous mode 04:40:38 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x9fff, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:38 executing program 0 (fault-call:5 fault-nth:4): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:38 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x7, r0, 0x1) r1 = perf_event_open$cgroup(&(0x7f0000000200)={0x7, 0x70, 0x7f, 0x5, 0x4, 0x2, 0x0, 0xffffffff00000001, 0x400, 0x0, 0x4, 0x7fff, 0x3f6, 0x9, 0x8, 0x4, 0x0, 0x10000, 0x0, 0x0, 0x5, 0x6, 0x2828, 0x100, 0x3, 0x8, 0x0, 0x6, 0x6, 0x8000, 0x4dc, 0x5, 0xd10e, 0xffff, 0x8, 0xffffffff, 0x8000, 0x569c, 0x0, 0x12e3, 0x4, @perf_bp, 0x800, 0x7, 0x401, 0x9, 0x80000000, 0xe5d, 0x1}, 0xffffffffffffffff, 0xc, r0, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="00004f378b1f0000000000f3000000000000000000"], &(0x7f00000000c0)='GPL\x00', 0x7, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) [ 2694.748329][ T7289] __nla_validate_parse: 22 callbacks suppressed [ 2694.748339][ T7289] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xa00000000000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2694.834049][ T7288] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:38 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xa207, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2694.900123][ T7281] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2694.940938][ T7294] FAULT_INJECTION: forcing a failure. [ 2694.940938][ T7294] name failslab, interval 1, probability 0, space 0, times 0 [ 2694.957790][ T7294] CPU: 1 PID: 7294 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2694.965702][ T7294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2694.975761][ T7294] Call Trace: [ 2694.979059][ T7294] dump_stack+0x172/0x1f0 [ 2694.983399][ T7294] should_fail.cold+0xa/0x15 [ 2694.987969][ T7294] ? find_next_bit+0x107/0x130 [ 2694.992717][ T7294] ? fault_create_debugfs_attr+0x180/0x180 [ 2694.998502][ T7294] ? page_to_nid.part.0+0x20/0x20 [ 2695.003507][ T7294] ? ___might_sleep+0x163/0x280 [ 2695.008339][ T7294] __should_failslab+0x121/0x190 [ 2695.013257][ T7294] should_failslab+0x9/0x14 [ 2695.017735][ T7294] kmem_cache_alloc_node_trace+0x274/0x750 [ 2695.023519][ T7294] ? pcpu_create_chunk+0x7f0/0x7f0 [ 2695.028623][ T7294] __kmalloc_node+0x3d/0x70 [ 2695.033127][ T7294] kvmalloc_node+0x68/0x100 [ 2695.037614][ T7294] pfifo_fast_init+0x10a/0x390 [ 2695.042355][ T7294] ? dev_deactivate_queue.constprop.0+0x240/0x240 [ 2695.048758][ T7294] qdisc_create_dflt+0x10a/0x1e0 [ 2695.053673][ T7294] dev_activate+0x6f6/0xb30 [ 2695.058162][ T7294] __dev_open+0x2b8/0x3f0 [ 2695.062474][ T7294] ? dev_set_rx_mode+0x40/0x40 [ 2695.067222][ T7294] ? __local_bh_enable_ip+0x15a/0x270 [ 2695.072585][ T7294] __dev_change_flags+0x565/0x6e0 [ 2695.077586][ T7294] ? dev_set_allmulti+0x30/0x30 [ 2695.082413][ T7294] ? mutex_lock_io_nested+0x1260/0x1260 [ 2695.087936][ T7294] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2695.094153][ T7294] dev_change_flags+0x92/0x170 [ 2695.098895][ T7294] dev_ifsioc+0x2aa/0xa00 [ 2695.103200][ T7294] ? full_name_hash+0xc0/0x100 [ 2695.107948][ T7294] ? register_gifconf+0x70/0x70 [ 2695.112785][ T7294] dev_ioctl+0x1b2/0xc68 [ 2695.117005][ T7294] sock_do_ioctl+0x1b7/0x2f0 [ 2695.121587][ T7294] ? compat_ifr_data_ioctl+0x160/0x160 [ 2695.127027][ T7294] ? trace_hardirqs_on+0x67/0x240 [ 2695.132058][ T7294] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2695.138283][ T7294] ? tomoyo_path_number_perm+0x263/0x520 [ 2695.143893][ T7294] sock_ioctl+0x3ed/0x780 [ 2695.148209][ T7294] ? dlci_ioctl_set+0x40/0x40 [ 2695.152884][ T7294] ? __kasan_check_read+0x11/0x20 [ 2695.157893][ T7294] ? dlci_ioctl_set+0x40/0x40 [ 2695.162555][ T7294] do_vfs_ioctl+0xdb6/0x13e0 [ 2695.167136][ T7294] ? ioctl_preallocate+0x210/0x210 [ 2695.172231][ T7294] ? __fget+0x384/0x560 [ 2695.176378][ T7294] ? ksys_dup3+0x3e0/0x3e0 [ 2695.180770][ T7294] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2695.186985][ T7294] ? fput_many+0x12c/0x1a0 [ 2695.191381][ T7294] ? tomoyo_file_ioctl+0x23/0x30 [ 2695.196297][ T7294] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2695.202513][ T7294] ? security_file_ioctl+0x8d/0xc0 [ 2695.207598][ T7294] ksys_ioctl+0xab/0xd0 [ 2695.211733][ T7294] __x64_sys_ioctl+0x73/0xb0 [ 2695.216304][ T7294] do_syscall_64+0xfd/0x6a0 [ 2695.220787][ T7294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2695.226656][ T7294] RIP: 0033:0x4598e9 [ 2695.230529][ T7294] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2695.250120][ T7294] RSP: 002b:00007f3dbc201c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2695.258522][ T7294] RAX: ffffffffffffffda RBX: 00007f3dbc201c90 RCX: 00000000004598e9 [ 2695.266480][ T7294] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 2695.274435][ T7294] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2695.282385][ T7294] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc2026d4 [ 2695.290346][ T7294] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 [ 2695.301273][ T7294] nr0: activation failed [ 2695.305693][ T7294] device nr0 entered promiscuous mode 04:40:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400a62339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x6800000000000000) 04:40:39 executing program 4: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7, 0x0, 0xffffffffffffff9c}, 0x3c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x2b, 'pids'}, {0x2d, 'rdma'}, {0x2b, 'pids'}]}, 0x12) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r1, &(0x7f0000847f95), &(0x7f000089b000)}, 0x18) 04:40:39 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xce02, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:39 executing program 0 (fault-call:5 fault-nth:5): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 2695.551886][ T7311] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:39 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xd401, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:39 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, r3, 0x7, r2, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000003c0)=r3, 0x12) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = getpid() perf_event_open(0x0, r6, 0x7, r5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r3, r5, 0x0, 0x6, &(0x7f0000000140)='veth0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ID(r7, 0x80082407, &(0x7f0000000200)) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x28}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r8, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x5, 0x5, 0x2, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 2695.632198][ T7323] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2695.653572][ T7324] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xe00000000000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x6c00000000000000) [ 2695.860911][ T7325] FAULT_INJECTION: forcing a failure. [ 2695.860911][ T7325] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2695.874139][ T7325] CPU: 1 PID: 7325 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2695.881937][ T7325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2695.891980][ T7325] Call Trace: [ 2695.895255][ T7325] dump_stack+0x172/0x1f0 [ 2695.899576][ T7325] should_fail.cold+0xa/0x15 [ 2695.904150][ T7325] ? fault_create_debugfs_attr+0x180/0x180 [ 2695.909938][ T7325] ? lock_downgrade+0x920/0x920 [ 2695.914770][ T7325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2695.920994][ T7325] should_fail_alloc_page+0x50/0x60 [ 2695.926173][ T7325] __alloc_pages_nodemask+0x1a1/0x900 [ 2695.931524][ T7325] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2695.937217][ T7325] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2695.942826][ T7325] ? __kasan_check_read+0x11/0x20 [ 2695.947833][ T7325] ? fault_create_debugfs_attr+0x180/0x180 [ 2695.953704][ T7325] cache_grow_begin+0x90/0xd20 [ 2695.958448][ T7325] ? __kmalloc_node+0x3d/0x70 [ 2695.963113][ T7325] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2695.969346][ T7325] kmem_cache_alloc_node_trace+0x689/0x750 [ 2695.975130][ T7325] ? pcpu_create_chunk+0x7f0/0x7f0 [ 2695.980228][ T7325] __kmalloc_node+0x3d/0x70 [ 2695.984710][ T7325] kvmalloc_node+0x68/0x100 [ 2695.989193][ T7325] pfifo_fast_init+0x10a/0x390 [ 2695.993946][ T7325] ? dev_deactivate_queue.constprop.0+0x240/0x240 [ 2696.000345][ T7325] qdisc_create_dflt+0x10a/0x1e0 [ 2696.005262][ T7325] dev_activate+0x6f6/0xb30 [ 2696.009746][ T7325] __dev_open+0x2b8/0x3f0 [ 2696.014063][ T7325] ? dev_set_rx_mode+0x40/0x40 [ 2696.018807][ T7325] ? __local_bh_enable_ip+0x15a/0x270 [ 2696.024163][ T7325] __dev_change_flags+0x565/0x6e0 [ 2696.029167][ T7325] ? dev_set_allmulti+0x30/0x30 [ 2696.033997][ T7325] ? security_file_ioctl+0x77/0xc0 [ 2696.039086][ T7325] ? mutex_lock_io_nested+0x1260/0x1260 [ 2696.044609][ T7325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2696.050827][ T7325] dev_change_flags+0x92/0x170 [ 2696.055567][ T7325] dev_ifsioc+0x2aa/0xa00 [ 2696.059872][ T7325] ? full_name_hash+0xc0/0x100 [ 2696.064621][ T7325] ? register_gifconf+0x70/0x70 [ 2696.069462][ T7325] dev_ioctl+0x1b2/0xc68 [ 2696.073683][ T7325] sock_do_ioctl+0x1b7/0x2f0 [ 2696.078271][ T7325] ? compat_ifr_data_ioctl+0x160/0x160 [ 2696.083755][ T7325] ? trace_hardirqs_on+0x67/0x240 [ 2696.088768][ T7325] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2696.095029][ T7325] ? tomoyo_path_number_perm+0x263/0x520 [ 2696.100644][ T7325] sock_ioctl+0x3ed/0x780 [ 2696.104952][ T7325] ? dlci_ioctl_set+0x40/0x40 [ 2696.109608][ T7325] ? __kasan_check_read+0x11/0x20 [ 2696.114611][ T7325] ? dlci_ioctl_set+0x40/0x40 [ 2696.119281][ T7325] do_vfs_ioctl+0xdb6/0x13e0 [ 2696.123850][ T7325] ? ioctl_preallocate+0x210/0x210 [ 2696.128935][ T7325] ? __fget+0x384/0x560 [ 2696.133082][ T7325] ? ksys_dup3+0x3e0/0x3e0 [ 2696.137501][ T7325] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2696.143730][ T7325] ? fput_many+0x12c/0x1a0 [ 2696.148130][ T7325] ? tomoyo_file_ioctl+0x23/0x30 [ 2696.153065][ T7325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2696.159298][ T7325] ? security_file_ioctl+0x8d/0xc0 [ 2696.164385][ T7325] ksys_ioctl+0xab/0xd0 [ 2696.168527][ T7325] __x64_sys_ioctl+0x73/0xb0 [ 2696.173099][ T7325] do_syscall_64+0xfd/0x6a0 [ 2696.177584][ T7325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2696.183465][ T7325] RIP: 0033:0x4598e9 [ 2696.187337][ T7325] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2696.206916][ T7325] RSP: 002b:00007f3dbc201c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2696.215303][ T7325] RAX: ffffffffffffffda RBX: 00007f3dbc201c90 RCX: 00000000004598e9 [ 2696.223277][ T7325] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 2696.231249][ T7325] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2696.239200][ T7325] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc2026d4 [ 2696.247152][ T7325] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 [ 2696.258415][ T7325] device nr0 entered promiscuous mode [ 2696.377201][ T7338] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:40 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xfa00, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:40 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x7400000000000000) 04:40:40 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, r3, 0x7, r2, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000003c0)=r3, 0x12) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = getpid() perf_event_open(0x0, r6, 0x7, r5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r3, r5, 0x0, 0x6, &(0x7f0000000140)='veth0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ID(r7, 0x80082407, &(0x7f0000000200)) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x28}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r8, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x5, 0x5, 0x2, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 2696.509548][ T7349] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2696.685846][ T7348] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:40 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xfe03, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:40 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000003, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) 04:40:40 executing program 0 (fault-call:5 fault-nth:6): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400a72339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) [ 2696.727565][ T7351] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2696.814802][ T7359] FAULT_INJECTION: forcing a failure. [ 2696.814802][ T7359] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2696.828027][ T7359] CPU: 1 PID: 7359 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2696.835827][ T7359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2696.845879][ T7359] Call Trace: [ 2696.849173][ T7359] dump_stack+0x172/0x1f0 [ 2696.853503][ T7359] should_fail.cold+0xa/0x15 [ 2696.858095][ T7359] ? pfifo_fast_init+0x10a/0x390 [ 2696.863039][ T7359] ? fault_create_debugfs_attr+0x180/0x180 [ 2696.868845][ T7359] ? save_stack+0x5c/0x90 [ 2696.873262][ T7359] ? save_stack+0x23/0x90 [ 2696.877595][ T7359] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2696.883401][ T7359] ? kasan_kmalloc+0x9/0x10 [ 2696.887900][ T7359] ? __kmalloc_node+0x4e/0x70 [ 2696.892582][ T7359] should_fail_alloc_page+0x50/0x60 [ 2696.897785][ T7359] __alloc_pages_nodemask+0x1a1/0x900 [ 2696.903150][ T7359] ? sock_ioctl+0x3ed/0x780 [ 2696.907689][ T7359] ? do_vfs_ioctl+0xdb6/0x13e0 [ 2696.912504][ T7359] ? ksys_ioctl+0xab/0xd0 [ 2696.916809][ T7359] ? __x64_sys_ioctl+0x73/0xb0 [ 2696.921552][ T7359] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2696.927243][ T7359] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2696.932849][ T7359] ? __kasan_check_read+0x11/0x20 [ 2696.937856][ T7359] ? fault_create_debugfs_attr+0x180/0x180 [ 2696.943700][ T7359] cache_grow_begin+0x90/0xd20 [ 2696.948447][ T7359] ? __kmalloc_node+0x3d/0x70 [ 2696.953118][ T7359] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2696.959346][ T7359] kmem_cache_alloc_node_trace+0x689/0x750 [ 2696.965143][ T7359] ? kasan_unpoison_shadow+0x35/0x50 [ 2696.970411][ T7359] __kmalloc_node+0x3d/0x70 [ 2696.974902][ T7359] kvmalloc_node+0x68/0x100 [ 2696.979388][ T7359] pfifo_fast_init+0x10a/0x390 [ 2696.984135][ T7359] ? dev_deactivate_queue.constprop.0+0x240/0x240 [ 2696.990537][ T7359] qdisc_create_dflt+0x10a/0x1e0 [ 2696.995460][ T7359] dev_activate+0x6f6/0xb30 [ 2696.999950][ T7359] __dev_open+0x2b8/0x3f0 [ 2697.004259][ T7359] ? dev_set_rx_mode+0x40/0x40 [ 2697.009000][ T7359] ? __local_bh_enable_ip+0x15a/0x270 [ 2697.014354][ T7359] __dev_change_flags+0x565/0x6e0 [ 2697.019358][ T7359] ? dev_set_allmulti+0x30/0x30 [ 2697.024189][ T7359] ? security_file_ioctl+0x77/0xc0 [ 2697.029279][ T7359] ? ksys_ioctl+0x57/0xd0 [ 2697.033582][ T7359] ? __x64_sys_ioctl+0x73/0xb0 [ 2697.038323][ T7359] ? mutex_lock_io_nested+0x1260/0x1260 [ 2697.043848][ T7359] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2697.050071][ T7359] dev_change_flags+0x92/0x170 [ 2697.054813][ T7359] dev_ifsioc+0x2aa/0xa00 [ 2697.059131][ T7359] ? full_name_hash+0xc0/0x100 [ 2697.063874][ T7359] ? register_gifconf+0x70/0x70 [ 2697.068717][ T7359] dev_ioctl+0x1b2/0xc68 [ 2697.072943][ T7359] sock_do_ioctl+0x1b7/0x2f0 [ 2697.077513][ T7359] ? compat_ifr_data_ioctl+0x160/0x160 [ 2697.082948][ T7359] ? trace_hardirqs_on+0x67/0x240 [ 2697.087957][ T7359] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2697.094177][ T7359] ? tomoyo_path_number_perm+0x263/0x520 [ 2697.099790][ T7359] sock_ioctl+0x3ed/0x780 [ 2697.104098][ T7359] ? dlci_ioctl_set+0x40/0x40 [ 2697.108759][ T7359] ? __kasan_check_read+0x11/0x20 [ 2697.113771][ T7359] ? dlci_ioctl_set+0x40/0x40 [ 2697.118427][ T7359] do_vfs_ioctl+0xdb6/0x13e0 [ 2697.122995][ T7359] ? ioctl_preallocate+0x210/0x210 [ 2697.128084][ T7359] ? __fget+0x384/0x560 [ 2697.132221][ T7359] ? ksys_dup3+0x3e0/0x3e0 [ 2697.136616][ T7359] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2697.142832][ T7359] ? fput_many+0x12c/0x1a0 [ 2697.147227][ T7359] ? tomoyo_file_ioctl+0x23/0x30 [ 2697.152144][ T7359] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2697.158362][ T7359] ? security_file_ioctl+0x8d/0xc0 [ 2697.163453][ T7359] ksys_ioctl+0xab/0xd0 [ 2697.167588][ T7359] __x64_sys_ioctl+0x73/0xb0 [ 2697.172163][ T7359] do_syscall_64+0xfd/0x6a0 [ 2697.176645][ T7359] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2697.182515][ T7359] RIP: 0033:0x4598e9 [ 2697.186389][ T7359] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2697.205969][ T7359] RSP: 002b:00007f3dbc201c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 04:40:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002740)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001280)="391e9f7efdf9ed7d02fd30d773096adf5863148758bb277ef369bdd42e18a5ceb8c8d26779a2413be00e734f80126e", 0x2f}, {&(0x7f00000012c0)="41c9aeeb9a246145ec805c3a80f0e2ce4b6a131e6fea576dadc4c5997429ed2f64e2a1c3daa5b34c5dada1123310ac834b8f5052c851b40d65baf060a81ec67440578aac1460cfb72c507a5f4418dbf9fe0849b906e10cd7cfc023ade6e0a04682ded377900e652730a82ca032e292a355ff2c2f0dcba8080e884a77ac5a47de628ce62c590b969508a224202d5b2342f913c603ec7fb6429b87b251d7ee23cd8733d32869f0945cc48b7f3aed5438cb3c1080ea1d", 0xb5}], 0x2, &(0x7f0000002e80)=ANY=[@ANYBLOB="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"], 0x1380}, 0x4000000) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000013c0)={r1}) sendmsg$kcm(r3, &(0x7f0000005840)={&(0x7f0000001400)=@caif=@dgm={0x25, 0x4, 0x1}, 0x80, &(0x7f0000005580)=[{&(0x7f0000001480)="13328d29e09fd1314c9b43cf8b90275e62b04f2b9893001119d8472af4c19eea8405758e07454bb5fc093a", 0x2b}, {&(0x7f00000014c0)="b71a2090887be2b9a58bb425a90205e91ae6aceea4e047f72d034e87b78765221cb9e9f1547b370eaa6901ff3a1a71a7464352b7c316a0a4f51bc244413e43cd72e49b4905bd13b3b60d96f016c2b8e1b7f4be1542ddcb82277721e1e7e0846e3ed975acc22f84a65f5db06bc0f7affec3fe093cd4b3228600bd71682927086b46db4f9434185cb9f0c3a88414ec4b795c7a9e33c04ca4a8297961cb93194c1512f9f771341dc18ff53ef36de4832c02208a9e34864b63d3a0de5cae945807e852d2359251361b46b1794559eb54e30bdb319603e86dc2c3a70212f9b5", 0xdd}, {&(0x7f00000015c0)="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", 0x1000}, {&(0x7f00000025c0)="ca0f6fe2eaaaeeaa55630e39b19e00c6708456379bdeb83c6463f75cb2f1a59c2919464a96f2acc8113d242a824baa7a51a72e9a6139a77dd912e9c875b3659673cc2f20aeccf57fca456a057894f51e90c06bb81e1d375b7e8e6ecc0e3a17cb0af6f5c6cbd6dcad993097f888746453bc8660d1e1e479383b2cf846549d9c3bbc0b52c8595b8b7346681041f64ec350181716071c5e164c029b1de2e6a9458eafe09e406c87f4e6c283993c47265de62f2ebfbf6e2bfed0272f22b43de1bc84039aa78bd0cfbfa82628cfafa8b6034856ea24575676bd10070a6b4626fff9afd8401a", 0xe3}, {&(0x7f00000042c0)="9366727356321542815e5b9d19763702524eccf21a32c1c623ca46feda3f04ec66dcbab24e372a79df5fde2c8a83542d63c9b572a4daa42204ef77c15e151526af19555dec6f8e0f871042e69a0bd564b93952b10ce08cbbb673dab84460c9fe9a1522d339f6e3a4dfb640b4270146dde11fed198b34d8388dde0ef94dd978cd9272e1a01626f430092e3f5ce8e00d9553d4c605dd4883dea003a35186bc7e26f70eea518dd2f77ef503b9f805eba78fcc499aec573be13137000a8263bcfdbe2e5b8970f17e18bd0e3a0e2d0c39d43a2aa7cf4ddad3d3162e4fe68043da", 0xde}, {&(0x7f00000026c0)="bb595fdf1fcd98afdb6c2b7f4f389a87f41414703e82d3da1b5fb82e880c85e0392fd79df5715df2cd44e90988ca9c492a1be38f3e447928dede9eb2478b41eb7f9835730dc3e9093a5ad31b115800b8d75a", 0x52}, {&(0x7f00000043c0)="c94f4ec6599a32f2849658200c2ed8c0d12b54e94c37ec95c2009a107f8143bb4ebde001d8879207bad479d0696a996b505a67d345c8a440f436d2ad28bd7971101a87aac5af9611ac34883682fb523cd2d8fffd626530e8b7310af6d5d8fcc91899cd334786a77fd3b95d6411ea305f942e58f2abd1ebe8f625a3d021d31902865c1469d0e818b3b89d0f978e05f2d0cfd650c8c0753a82d93419ade9f73c00b93089193104f3d80fb1e8c3d866466347376aead5465225befbdf8ee752a634bd6ad36c", 0xc4}, {&(0x7f00000044c0)="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", 0x1000}, {&(0x7f00000054c0)="15293b6570a22cc15cd802dc1221f63f55fc15806b5bbb912d590093f39086802d8c64163903feeec84c9f619a321fc89058551d6fc8da4221fa063a254f18ea671c9beb6ca408e63fd9ad3b5dca212693e69200af39558b02ec5e7722a228712db4974981ebc0376a19c9adba31e8e220724d33c9756b4aa4d2cdfd53a49a6e6cf43232a825b8e958f1acf8d991446f37f20e79db46f1d9b72cd4637cbe2e8107a661ba6037819cb178de69", 0xac}], 0x9, &(0x7f0000005640)=[{0x58, 0x6, 0x10000, "2b570dc75b405e1f23e1676fa132d92918a09a52204291dac84c411905f494e9536db3678ed42901d6ec8e7fcd849c1d1a56d9ddbf9d0a24dc7d44ec5164926336ed0dcb072f81b1"}, {0x48, 0x119, 0x786, "ea47f7b8c2286cc8f7e132952eecc2578daa2f89b19a0e418433ccb0ffe585adba71fe47b7f5227aa40132027aecc88a314183735781073d"}, {0x78, 0x232, 0x8000, "b5df22110cece4cb8f4b46647ec5e90e68e4dff153de3a991c54ab674f981274e06d344b0d719431003f3f37a9cec4c474b5365ce1cf5a2ea32d3530d690a4a6d17f997882cec92e9cfc5427e9ce019c9de0c01cf96c38b03a4da43c26badb4757"}, {0xe8, 0x103, 0x8, "6029f981a7cd45d0bd7597526f8c9fbe28fa66df4683a1b7c975f6bc3327d8ec88e1fa69a343e890dbaf14fed01c5dd05af8d702c9a4240fcec3221477b76a8573cfc150468f7fc7204ff5d0ab9d76cd8cffb08bb929be0f0a0a045c8655151543824784994f01a356ddac9afd25ee0df1e90517aa3cfc6603d3d337475ee93d855c2b234b154b3b79959f4ab2668811f55b9fab416d3297ab72013cdd376b326b70ae31f82312b725ed1f0eda0be4475ce5e920a59f953ee084476fc01a4ae1107e899c1163a8b9d3aca8a3b4fa91979454"}], 0x200}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="06bd70c86cc6059a1eb423dd739d88b403b31097e68df9cddb0104eda300cd8a6013755b5c69509ef1afd2ad14d91531b754cb62b27b8ae72b20c2d0b1d859dc7ae3f6968e18d8969164f264d1e2dd396fd995c452048fa1788e1953", 0x5c}], 0x1, &(0x7f0000000240)=[{0x1010, 0x114, 0x8001, "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"}], 0x1010}, 0x4045) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002e40)={&(0x7f0000002780)=@un=@abs={0x1, 0x0, 0x4e20}, 0x80, &(0x7f0000002d80)=[{&(0x7f0000002800)="f9ca2630f0e7b1d995f00b34848fae3a009ee0f6bcd85f3b18f7f041c551f509c030e335877a0750a66a41fce2094c4b09f45cffbd10d0a6359c8c9e347fa12a1ff59386b3bcbbf9648530ebd51119594a75730a9e61db6f37fdcaadde6b4b8cf3b630f3928e9c581d02f34da5910763dee931e7e48747ab549f13cbdb110a6c95bbd49e03d1a3bd6337ff34d187401bfb6912513470b7a3abdafaedccf87a89bcf243d54f71843120a6d78bd8c6eeef6643989120d97709e8480df9ca1055026629b4e54b05230e0618204b925ee244531acd326945a9ff240031a2354b14980a477c9a12414a8617f4", 0xea}, {&(0x7f0000002900)="27db78ca4914c2192c275be7cadfe8a88818c79df34b06e16d552440ce8e8e5a9f2192b095963b71cdaebceddac68602317c56afba89b34492174d24ed13ace3cee4e03602cbbbd4f757e65a035083ab362d82ff653aeed2fd2bca0c4e61cac77f3a39bae38d7600804e6ed5ce369810fac4d846b7b4e90b48e6eb77d4590a6e0bb08c0f3d5f510bf693145903dd30b4", 0x90}, {&(0x7f00000029c0)="3c190798e0df79a74246704d8c077b9b3946ce339be0f2a1bab6ce6cfb83781bf1b8414896a9", 0x26}, {&(0x7f0000002a00)="3ced1855695c67e3ab507ba0372985febee2e1a40b746a53542710385e89326302151a612b42e588c1d49d029cb730f3ae93a253acf824dff33cd566b235efe35b8fc6301810fda336d3882b42546e60bb2a2cfe853178fe215db19c13de7cabb4b4a30101daea7b5f69a2b353b282d3e8d220e7c3a9173b96dda5a6d58f8e1fda6fe0e87e26f27c884a0d9e9b9aaf0a", 0x90}, {&(0x7f0000002ac0)="1432c7cfced9889ad7b157d017ddb2aee2cb53cca06afb2b213fc2ec6ccba7a27df3693303e0147d5db25ae35ee002ba27be35c47726ae70c16a83ffe368161f5b631571bcf372e7cb12473a7f9b00c03900017a1b9919c5a8b086af44cee5a5cc2e319b91cccc82ef56d95626eaa2a37e15ddc39065c2e0a9", 0x79}, {&(0x7f0000002b40)="035beacc84a0f64f1e139fe3093d904687f20c8773ab6f5354853c0c97800aded276cdf02c6c98d7a05c5fd86fa55a1a67f3e2642994c8f48ef24571451e55e0c9de485bbfaba2cdf0e60b23f9b0747414374702f3ed7498bb97b27d8b131cc7c5b9ae7eb3560340142f44b5a8d762b99bf433647ec908fd3109c846eb50d5b38f517da42cfd163039f9235d4fe922b1a3d46ad2a1efab9219e29ca2c7fe0d3f9bf7c65a37fb92f0bfeb71dc99776402bafb5a01429e851ac8991c864a0c6f47bd256705", 0xc4}, {&(0x7f0000002c40)="e47f01d9f303d9b8a8ecf615faed40434c7488af47", 0x15}, {&(0x7f0000002c80)="a13ecf1fabf6668201df5587ecc2d47b93fda698ac240667ec7e1e42cd033ec4af245d82b39e43ed237a444ece28905d90995c6558d8352c058c7d64abda9d52e94a6522c03ee4d2ab6c5c1d1deb10284c2443c35af7a708d11e6f90fab8614714d1355fdee7a1afbaacd03bdc1ad224e61cb7f79dc51b1385794161ac5a22357233f719eb0e6758c8ede3a7ebdc15467fc9dad40faaf63b8c02e8cd47515f0755682e96871177eee7f06ddf2ff8203fb90f1e18aebc3cfab9670c814e9fa357826dcd016957d368aab4779438b5a67bb8f34f9ac75b11e60e4f298d25304cf938eb8d1b41c5ebb5c1b0a53fc35cd99a8f222d054f84129692", 0xf9}], 0x8, &(0x7f0000002e00)=[{0x38, 0x103, 0xb6a0, "fc2286f836f3107ff07e01764933236bdb81a92c85c0e75fa448159f8e3a6bcc939ca07f5d"}], 0x38}, 0x4000010) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="4c140081f87059ae08060c0a000284000040d0ff580103fe0500030001546fabca1b4e7d06a6bd7c8f934eff030000ea94889e45bfae00000000e6d9220c7a18ab83136f4d395c7c89", 0x49}], 0x1, 0x0, 0xfffffe1b}, 0x0) 04:40:40 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x7a00000000000000) 04:40:40 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xff00, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xf00000000000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2697.214355][ T7359] RAX: ffffffffffffffda RBX: 00007f3dbc201c90 RCX: 00000000004598e9 [ 2697.222303][ T7359] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 2697.230366][ T7359] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2697.238321][ T7359] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc2026d4 [ 2697.246281][ T7359] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 [ 2697.259326][ T7359] device nr0 entered promiscuous mode 04:40:41 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xff9f, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x9effffff00000000) 04:40:41 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f00000000c0)=r2, 0xfffffe57) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local, 0x5}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=':', 0x1}], 0x1}, 0x40) r3 = openat$cgroup(r0, &(0x7f0000000800)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r3, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) 04:40:41 executing program 0 (fault-call:5 fault-nth:7): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:41 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x5d350, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x27}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x2, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x442}, [@ldst={0x0, 0x3, 0x9f79b162bd691695, 0xa, 0x3, 0xffffffffffffffe0, 0x1}, @jmp={0x5, 0x20, 0x8, 0x0, 0x5, 0x20, 0xfffffffffffffff0}, @ldst={0x0, 0x3, 0x3, 0x4, 0x3, 0x30, 0x91d9a24b67a40d67}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0xcf, &(0x7f0000000300)=""/207, 0x40f00, 0x2, [], 0x0, 0x5, r0, 0x8, &(0x7f00000000c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x2, 0x3, 0x3}, 0x10}, 0x70) 04:40:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x3f00000000000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2697.892853][ T7396] FAULT_INJECTION: forcing a failure. [ 2697.892853][ T7396] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2697.906072][ T7396] CPU: 0 PID: 7396 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2697.913873][ T7396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2697.913879][ T7396] Call Trace: [ 2697.913906][ T7396] dump_stack+0x172/0x1f0 [ 2697.913929][ T7396] should_fail.cold+0xa/0x15 [ 2697.913948][ T7396] ? pfifo_fast_init+0x10a/0x390 [ 2697.913969][ T7396] ? fault_create_debugfs_attr+0x180/0x180 [ 2697.913983][ T7396] ? save_stack+0x5c/0x90 [ 2697.914001][ T7396] ? save_stack+0x23/0x90 [ 2697.936199][ T7396] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2697.961299][ T7396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2697.967543][ T7396] should_fail_alloc_page+0x50/0x60 [ 2697.972736][ T7396] __alloc_pages_nodemask+0x1a1/0x900 [ 2697.978105][ T7396] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2697.983810][ T7396] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2697.989437][ T7396] ? __kasan_check_read+0x11/0x20 [ 2697.994469][ T7396] ? fault_create_debugfs_attr+0x180/0x180 [ 2698.000281][ T7396] cache_grow_begin+0x90/0xd20 [ 2698.005033][ T7396] ? __kmalloc_node+0x3d/0x70 [ 2698.009701][ T7396] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2698.015993][ T7396] kmem_cache_alloc_node_trace+0x689/0x750 [ 2698.021786][ T7396] ? kasan_unpoison_shadow+0x35/0x50 [ 2698.027061][ T7396] __kmalloc_node+0x3d/0x70 [ 2698.031556][ T7396] kvmalloc_node+0x68/0x100 [ 2698.036052][ T7396] pfifo_fast_init+0x10a/0x390 [ 2698.040810][ T7396] ? dev_deactivate_queue.constprop.0+0x240/0x240 [ 2698.047215][ T7396] qdisc_create_dflt+0x10a/0x1e0 [ 2698.052145][ T7396] dev_activate+0x6f6/0xb30 [ 2698.056641][ T7396] __dev_open+0x2b8/0x3f0 [ 2698.060965][ T7396] ? dev_set_rx_mode+0x40/0x40 [ 2698.065719][ T7396] ? __local_bh_enable_ip+0x15a/0x270 [ 2698.071086][ T7396] __dev_change_flags+0x565/0x6e0 [ 2698.076097][ T7396] ? dev_set_allmulti+0x30/0x30 [ 2698.080936][ T7396] ? security_file_ioctl+0x77/0xc0 [ 2698.086038][ T7396] ? mutex_lock_io_nested+0x1260/0x1260 [ 2698.091570][ T7396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2698.097800][ T7396] dev_change_flags+0x92/0x170 [ 2698.102555][ T7396] dev_ifsioc+0x2aa/0xa00 [ 2698.106878][ T7396] ? full_name_hash+0xc0/0x100 [ 2698.111634][ T7396] ? register_gifconf+0x70/0x70 [ 2698.116480][ T7396] dev_ioctl+0x1b2/0xc68 [ 2698.121152][ T7396] sock_do_ioctl+0x1b7/0x2f0 [ 2698.125734][ T7396] ? compat_ifr_data_ioctl+0x160/0x160 [ 2698.131181][ T7396] ? trace_hardirqs_on+0x67/0x240 [ 2698.136201][ T7396] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2698.142434][ T7396] ? tomoyo_path_number_perm+0x263/0x520 [ 2698.148058][ T7396] sock_ioctl+0x3ed/0x780 [ 2698.152373][ T7396] ? dlci_ioctl_set+0x40/0x40 [ 2698.157040][ T7396] ? __kasan_check_read+0x11/0x20 [ 2698.162057][ T7396] ? dlci_ioctl_set+0x40/0x40 [ 2698.166732][ T7396] do_vfs_ioctl+0xdb6/0x13e0 [ 2698.171312][ T7396] ? ioctl_preallocate+0x210/0x210 [ 2698.176413][ T7396] ? __fget+0x384/0x560 [ 2698.180573][ T7396] ? ksys_dup3+0x3e0/0x3e0 [ 2698.184991][ T7396] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2698.191221][ T7396] ? fput_many+0x12c/0x1a0 [ 2698.195627][ T7396] ? tomoyo_file_ioctl+0x23/0x30 [ 2698.200557][ T7396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2698.206915][ T7396] ? security_file_ioctl+0x8d/0xc0 [ 2698.212023][ T7396] ksys_ioctl+0xab/0xd0 [ 2698.216199][ T7396] __x64_sys_ioctl+0x73/0xb0 [ 2698.220789][ T7396] do_syscall_64+0xfd/0x6a0 [ 2698.225299][ T7396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2698.231187][ T7396] RIP: 0033:0x4598e9 [ 2698.235070][ T7396] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2698.254654][ T7396] RSP: 002b:00007f3dbc1e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2698.263049][ T7396] RAX: ffffffffffffffda RBX: 00007f3dbc1e0c90 RCX: 00000000004598e9 [ 2698.271005][ T7396] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 2698.278976][ T7396] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2698.286939][ T7396] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc1e16d4 [ 2698.294896][ T7396] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 [ 2698.303168][ T7396] device nr0 entered promiscuous mode 04:40:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400a82339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x9f02000000000000) 04:40:42 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x8c310, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x3c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) 04:40:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x4000000000000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:42 executing program 0 (fault-call:5 fault-nth:8): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:42 executing program 4: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030000002ff96e27bf28b285fe3903a44a6017ed", 0x21}], 0x1}, 0x0) socket$kcm(0x29, 0x5, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8953, &(0x7f0000000040)=0x2) 04:40:42 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x100000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xf0ffffff00000000) [ 2698.801650][ T7436] FAULT_INJECTION: forcing a failure. [ 2698.801650][ T7436] name failslab, interval 1, probability 0, space 0, times 0 [ 2698.820888][ T7436] CPU: 0 PID: 7436 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2698.828707][ T7436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2698.838761][ T7436] Call Trace: [ 2698.842057][ T7436] dump_stack+0x172/0x1f0 [ 2698.846384][ T7436] should_fail.cold+0xa/0x15 [ 2698.850967][ T7436] ? fault_create_debugfs_attr+0x180/0x180 [ 2698.856761][ T7436] ? page_to_nid.part.0+0x20/0x20 [ 2698.861774][ T7436] ? ___might_sleep+0x163/0x280 [ 2698.866610][ T7436] __should_failslab+0x121/0x190 [ 2698.871533][ T7436] should_failslab+0x9/0x14 [ 2698.876018][ T7436] kmem_cache_alloc_trace+0x2d3/0x790 [ 2698.881460][ T7436] ? kasan_kmalloc+0x9/0x10 [ 2698.885940][ T7436] ? __kmalloc_track_caller+0x34d/0x760 [ 2698.891471][ T7436] call_usermodehelper_setup+0x9b/0x320 [ 2698.896993][ T7436] ? dec_ucount+0x250/0x250 [ 2698.901479][ T7436] __request_module+0x456/0xbab [ 2698.906312][ T7436] ? dev_load+0x1ce/0x210 [ 2698.910626][ T7436] ? free_modprobe_argv+0xa0/0xa0 [ 2698.915631][ T7436] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2698.920982][ T7436] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2698.926339][ T7436] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2698.932298][ T7436] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2698.938522][ T7436] ? apparmor_capable+0x2ed/0x630 [ 2698.943523][ T7436] ? cap_capable+0x205/0x270 [ 2698.948092][ T7436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2698.954313][ T7436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2698.960623][ T7436] ? security_capable+0x95/0xc0 [ 2698.965456][ T7436] dev_load+0x1ce/0x210 [ 2698.969592][ T7436] dev_ioctl+0x19f/0xc68 [ 2698.982242][ T7436] sock_do_ioctl+0x1b7/0x2f0 [ 2698.986813][ T7436] ? compat_ifr_data_ioctl+0x160/0x160 [ 2698.992251][ T7436] ? trace_hardirqs_on+0x67/0x240 [ 2698.997261][ T7436] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2699.003482][ T7436] ? tomoyo_path_number_perm+0x263/0x520 [ 2699.009097][ T7436] sock_ioctl+0x3ed/0x780 [ 2699.013407][ T7436] ? dlci_ioctl_set+0x40/0x40 [ 2699.018067][ T7436] ? __kasan_check_read+0x11/0x20 [ 2699.023075][ T7436] ? dlci_ioctl_set+0x40/0x40 [ 2699.027736][ T7436] do_vfs_ioctl+0xdb6/0x13e0 [ 2699.032309][ T7436] ? ioctl_preallocate+0x210/0x210 [ 2699.037410][ T7436] ? __fget+0x384/0x560 [ 2699.041552][ T7436] ? ksys_dup3+0x3e0/0x3e0 [ 2699.045946][ T7436] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2699.052171][ T7436] ? fput_many+0x12c/0x1a0 [ 2699.056569][ T7436] ? tomoyo_file_ioctl+0x23/0x30 [ 2699.061486][ T7436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2699.067706][ T7436] ? security_file_ioctl+0x8d/0xc0 [ 2699.072797][ T7436] ksys_ioctl+0xab/0xd0 [ 2699.076936][ T7436] __x64_sys_ioctl+0x73/0xb0 [ 2699.081514][ T7436] do_syscall_64+0xfd/0x6a0 [ 2699.086000][ T7436] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2699.091871][ T7436] RIP: 0033:0x4598e9 [ 2699.095748][ T7436] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2699.115331][ T7436] RSP: 002b:00007f3dbc1bfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2699.123720][ T7436] RAX: ffffffffffffffda RBX: 00007f3dbc1bfc90 RCX: 00000000004598e9 [ 2699.131667][ T7436] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 2699.139614][ T7436] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 2699.147565][ T7436] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc1c06d4 [ 2699.155513][ T7436] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 04:40:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x68, 0xc, 0x0, 0x3, 0x7, 0x20, 0x1, 0x0, 0x4, 0x0, 0x3ff, 0xdfd, 0x4, 0x2, 0xda8, 0xffffffff, 0x80000001, 0x3, 0x36cf000000, 0x0, 0x0, 0xfffffffffffffffe, 0x7, 0x0, 0x376, 0xfffffffffffffffe, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8, 0x3}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f00000014c0)={0x7, 0x70, 0x1, 0x101, 0x0, 0x4, 0x0, 0x1, 0x10040, 0x9, 0x6, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x401, 0x123, 0x7, 0x0, 0x8, 0x0, 0x0, 0x1f, 0x9, 0x0, 0x6, 0x5, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x5, 0x4da5}, 0x0, 0x0, 0xbe6, 0x0, 0x0, 0x6, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socketpair(0x0, 0xa, 0x5, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f000001c4c0)={&(0x7f0000019d80)=@can, 0x80, 0x0, 0x0, &(0x7f000001c400)=""/161, 0xa1}, 0x40002142) recvmsg(r4, 0x0, 0x218dcf6b55338cf8) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x200000}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r5, &(0x7f0000000e80)="51a2e013a1b412d86d543c2b4d861c4ae609e92b2ae393e09191c610b9ef1ff7ebabaf75aef063d75b84fcd7804394dddafde55622927c58635a80f0c4f5f353ddeec75ebcf92fd6da70477245bee334e9788474789137370f4e420e4625cdfa8a3e8329c9c9c43e71cbc6018f39f34c2dbd30fa050dd13d5caa4aad425a3d855f92be6bddf851fd8b907a2582a714ed1bd1c652be8f958626ca4895128f715c42e0c6f835799d1624fc122a0b4c159251", 0x0, 0x4000000000000}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000001540)='cpuset.effective_I\xb5P\a\xfc\xb9{G\xb5\xd0zN\xedt\x02lcpu\x02\x00\x05VR\xa0]\x8b\xae\xb8\x97r\x8fWf\xf6,vKO\x9c\xe9\xa2,K\x18\x9f\x81:\xd3\x04!\x89!;Z\xad\xb7\xbd\xc4\x8a]\xb5\xc4\xda7Or\x1aBTp^Zm\x82G\xd0\xf2\xf8\xa7\xb7\x04\xc4\x16\x1c\x1dYS\x06U]\xa2U4\xf4\xdb\x9d\x84\xa7\xd5\xdb;dj\xe7\r\x17\xbc\xf7\xc6\xc1K%y\xe5\x82e\a\x146\x80UC\xb6\xd2\xc8\xd7\xc9\x96b\x15\xb6x$>\xa35B\xc9\x9e0v\x8bV\x1dT\xf2\xd6\x87\x1c\x16d\x03\xde\xfd\x8aC,\b\x9f))\xceZv\x01\x04\x00\x00\x00\x00\x00\x00\xce\x8e\xe04TGH\xe5\x1d\xc4~X\x13\xae\xc9[\xa5\\\xf1\xb8}\f\b\xec\xe7\xca\xb5\x16v\xed\xcc\xf8xD\xc1G\xde\x9f\xf8\xca\xd0!p\x8e\x9f\xd7d\xd1\xe6\xea\x8e\xb5\xf2\x03\x90]R\xc7\x0e\a\x9c\xe9\xe9s\xdd+=\xb5\x89~>\xf9j\xb3=1t\xf56\x8e\xb2c\xf6\x83\xba\xee\xb7\xbc#+\xc3\'\x11\xd6\xc6\x85\xeb\xc7\xeb\n\xb9\x8b\x03F\x1e\x92\x9a=M\x88\xa0\x99\x90Tq|\xd4{\xc2\n\xc3p\xf64\x9f&u\xed\xd3q`\a\xec\xac\a\xba \x04\xf46\xb7\xa0\xd16\'G\xc62\xe2\x83\v\x12!5!HQ\xc0\xccm\xc4\x00\x9e\x9e\x94L\x96\xd1\xc7Q,D\x19\x93\'C\x92\x9e\xc5\xe5{\x1b\x83\x17<\x18\xefb\xfe\x11\x03\x9dP\xdfv\xbb\xd0/&\xacM\xa0a\x8dD\xbe\xc2\x1b', 0x2761, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000a80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000002540)=""/4096, 0xfffffffffffffdfd}, {&(0x7f0000000b00)=""/146, 0x92}], 0x2, &(0x7f0000000c00)=""/20, 0x14}, 0x40000040) ioctl$TUNGETSNDBUF(r6, 0x800454d3, &(0x7f0000000600)) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001480)='./file0\x00', 0x4) close(r7) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) socketpair(0x3, 0x5, 0x8fb, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000cc0)='./cgroup/syz0\x00') perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xbb0b, 0x57c1, 0x6, 0xfff, 0x0, 0x100000000, 0x22400, 0x0, 0x3, 0x3, 0x7fffffff, 0x1, 0x1ff, 0x7, 0x6, 0x8340, 0xf45b, 0x7, 0x0, 0x1, 0x8, 0x593, 0xfffffffffffff000, 0x7, 0x4, 0x9, 0x400000, 0x5, 0x8001, 0x2, 0x1, 0x0, 0x2, 0x3ff, 0x7fff, 0x9, 0x0, 0x8734, 0x1, @perf_bp={0x0, 0x6}, 0x2002, 0x6, 0x8, 0x8, 0x5, 0x6, 0x800}, 0x0, 0x8, r7, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x1ff) socketpair(0x0, 0x1, 0x8000, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r8, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', r8}, 0x10) 04:40:42 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x200000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2699.194872][ T7436] device nr0 entered promiscuous mode 04:40:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xffffff7f00000000) 04:40:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400a92339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x6000000000000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x1000000000000002, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f00000001c0)='veth0\x00') r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000380)={0x0, 0x1ff, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000540)={0x0, 0x358, 0x0, 0x0, 0x0, 0xb881391f0dda420a}, 0x0) 04:40:43 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x400000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:43 executing program 0 (fault-call:5 fault-nth:9): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xffffffff00000000) [ 2699.774035][ T7466] __nla_validate_parse: 14 callbacks suppressed [ 2699.774042][ T7466] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2699.776757][ T7465] FAULT_INJECTION: forcing a failure. [ 2699.776757][ T7465] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2699.802733][ T7465] CPU: 0 PID: 7465 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2699.810519][ T7465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2699.820562][ T7465] Call Trace: [ 2699.823842][ T7465] dump_stack+0x172/0x1f0 [ 2699.828158][ T7465] should_fail.cold+0xa/0x15 [ 2699.832734][ T7465] ? pfifo_fast_init+0x10a/0x390 [ 2699.837656][ T7465] ? fault_create_debugfs_attr+0x180/0x180 [ 2699.843443][ T7465] ? save_stack+0x5c/0x90 [ 2699.847757][ T7465] ? save_stack+0x23/0x90 [ 2699.852066][ T7465] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2699.857852][ T7465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2699.864079][ T7465] should_fail_alloc_page+0x50/0x60 [ 2699.869259][ T7465] __alloc_pages_nodemask+0x1a1/0x900 [ 2699.874613][ T7465] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2699.880312][ T7465] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2699.885921][ T7465] ? __kasan_check_read+0x11/0x20 [ 2699.890933][ T7465] ? fault_create_debugfs_attr+0x180/0x180 [ 2699.896728][ T7465] cache_grow_begin+0x90/0xd20 [ 2699.901479][ T7465] ? __kmalloc_node+0x3d/0x70 [ 2699.906135][ T7465] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2699.912355][ T7465] kmem_cache_alloc_node_trace+0x689/0x750 [ 2699.918140][ T7465] ? kasan_unpoison_shadow+0x35/0x50 [ 2699.923408][ T7465] __kmalloc_node+0x3d/0x70 [ 2699.927892][ T7465] kvmalloc_node+0x68/0x100 [ 2699.932379][ T7465] pfifo_fast_init+0x10a/0x390 [ 2699.937133][ T7465] ? dev_deactivate_queue.constprop.0+0x240/0x240 [ 2699.943529][ T7465] qdisc_create_dflt+0x10a/0x1e0 [ 2699.948448][ T7465] dev_activate+0x6f6/0xb30 [ 2699.952935][ T7465] __dev_open+0x2b8/0x3f0 [ 2699.957253][ T7465] ? dev_set_rx_mode+0x40/0x40 [ 2699.962000][ T7465] ? __local_bh_enable_ip+0x15a/0x270 [ 2699.967354][ T7465] __dev_change_flags+0x565/0x6e0 [ 2699.972357][ T7465] ? dev_set_allmulti+0x30/0x30 [ 2699.977190][ T7465] ? mutex_lock_io_nested+0x1260/0x1260 [ 2699.982726][ T7465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2699.988950][ T7465] dev_change_flags+0x92/0x170 [ 2699.993700][ T7465] dev_ifsioc+0x2aa/0xa00 [ 2699.998006][ T7465] ? full_name_hash+0xc0/0x100 [ 2700.002751][ T7465] ? register_gifconf+0x70/0x70 [ 2700.007585][ T7465] dev_ioctl+0x1b2/0xc68 [ 2700.011809][ T7465] sock_do_ioctl+0x1b7/0x2f0 [ 2700.016400][ T7465] ? compat_ifr_data_ioctl+0x160/0x160 [ 2700.021926][ T7465] ? trace_hardirqs_on+0x67/0x240 [ 2700.026944][ T7465] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2700.033164][ T7465] ? tomoyo_path_number_perm+0x263/0x520 [ 2700.038778][ T7465] sock_ioctl+0x3ed/0x780 [ 2700.043100][ T7465] ? dlci_ioctl_set+0x40/0x40 [ 2700.047857][ T7465] ? __kasan_check_read+0x11/0x20 [ 2700.052864][ T7465] ? dlci_ioctl_set+0x40/0x40 [ 2700.057522][ T7465] do_vfs_ioctl+0xdb6/0x13e0 [ 2700.062094][ T7465] ? ioctl_preallocate+0x210/0x210 [ 2700.067186][ T7465] ? __fget+0x384/0x560 [ 2700.071326][ T7465] ? ksys_dup3+0x3e0/0x3e0 [ 2700.075721][ T7465] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2700.081945][ T7465] ? fput_many+0x12c/0x1a0 [ 2700.086346][ T7465] ? tomoyo_file_ioctl+0x23/0x30 [ 2700.091270][ T7465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2700.097498][ T7465] ? security_file_ioctl+0x8d/0xc0 [ 2700.102589][ T7465] ksys_ioctl+0xab/0xd0 [ 2700.106729][ T7465] __x64_sys_ioctl+0x73/0xb0 [ 2700.111302][ T7465] do_syscall_64+0xfd/0x6a0 [ 2700.115788][ T7465] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2700.121657][ T7465] RIP: 0033:0x4598e9 [ 2700.125538][ T7465] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2700.145117][ T7465] RSP: 002b:00007f3dbc201c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2700.153504][ T7465] RAX: ffffffffffffffda RBX: 00007f3dbc201c90 RCX: 00000000004598e9 [ 2700.161456][ T7465] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 04:40:43 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x800000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:43 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xb) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000380)=ANY=[@ANYBLOB="00feffffffffffff00000180c2000003aaaaaaaaaabbffffffffffff"]) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="d80000004e00813f9bccc651df544ff211e00f80ecdb4cb9040a1965000b007c05e87c55a11200e1730000000000000000000000000000812fa80005001b4163e3e53db14ca0508ac1799d58f030035c3b61c1d67f6faf7d7134cf6efbe06bbace8017cbec4c2ee5a7cef4c02631631fb781643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6dd457c0b03c10964c360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad80953d5e1cace80ed0b7fec3aef0522cbee5de6ccd40dd6e4edef3d93452a92954b43370e9703db0de7", 0xd8}], 0x1}, 0x4800) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = gettid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, 0x0, 0x0) r5 = openat$cgroup(r4, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000140)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0xffffffff, 0xff, 0x0, 0x6, 0x0, 0x6, 0x20, 0xa56079b94ce536c6, 0x8, 0x3, 0x0, 0x7f, 0x6, 0x1, 0x1, 0x3ff, 0x0, 0x4, 0x8, 0x7fffffff, 0x5, 0x400000, 0xfffffffffffffffe, 0x9, 0x9, 0x8b3, 0x7, 0x80, 0x0, 0x0, 0x5, 0x80, 0x800, 0x2, 0x88, 0x96a, 0x0, 0xfffffffffffff90e, 0x4, @perf_config_ext={0x6f4, 0xffffffffffff0000}, 0x808c, 0x0, 0x0, 0x3, 0x20, 0x400, 0x24}, r3, 0xf, r1, 0x1) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0x7ff, 0x0, 0x0, 0x5, 0x0, 0x5, 0x60, 0x0, 0x0, 0x9, 0x1, 0x3, 0x4, 0xffffffffffffd925, 0x7, 0x7fff, 0xffffffff, 0xfffffffffffffeff, 0xdf5, 0x2, 0x5, 0x5, 0x1, 0x1000000001, 0x403, 0xeda, 0x1, 0x7ead, 0x4, 0x2, 0x1000, 0x8, 0x100000001, 0x1f, 0x9, 0x5, 0x0, 0xe02, 0x0, @perf_config_ext={0x1, 0x1}, 0x2c4, 0x9, 0x6, 0x0, 0x8001, 0x3, 0x67}, 0xffffffffffffffff, 0x5, r1, 0x6) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x400, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc00000000, 0x0, 0x0, 0x0, 0x7fff, 0x40, 0x20, 0x0, 0x6, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x7}) [ 2700.169405][ T7465] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2700.177355][ T7465] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc2026d4 [ 2700.185303][ T7465] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 [ 2700.233792][ T7465] device nr0 entered promiscuous mode 04:40:44 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x8000a0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:44 executing program 0 (fault-call:5 fault-nth:10): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x9effffff00000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2700.528153][ T7471] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:44 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x8001a0, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2700.609439][ T7487] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2700.650193][ T7472] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2700.819626][ T7490] device nr0 entered promiscuous mode [ 2700.825143][ T7490] FAULT_INJECTION: forcing a failure. [ 2700.825143][ T7490] name failslab, interval 1, probability 0, space 0, times 0 [ 2700.848783][ T7490] CPU: 0 PID: 7490 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2700.856607][ T7490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2700.856614][ T7490] Call Trace: [ 2700.856632][ T7490] dump_stack+0x172/0x1f0 [ 2700.856655][ T7490] should_fail.cold+0xa/0x15 [ 2700.869969][ T7490] ? fault_create_debugfs_attr+0x180/0x180 [ 2700.869991][ T7490] ? br_get_link_af_size_filtered+0x13c/0xa00 [ 2700.890775][ T7490] __should_failslab+0x121/0x190 [ 2700.895800][ T7490] should_failslab+0x9/0x14 [ 2700.900290][ T7490] kmem_cache_alloc_node+0x56/0x740 [ 2700.905465][ T7490] ? br_get_linkxstats_size+0x390/0x390 [ 2700.910993][ T7490] __alloc_skb+0xd5/0x5e0 [ 2700.915300][ T7490] ? netdev_alloc_frag+0x1b0/0x1b0 [ 2700.920390][ T7490] ? if_nlmsg_size+0x4ad/0x9e0 [ 2700.925135][ T7490] rtmsg_ifinfo_build_skb+0x74/0x190 [ 2700.930395][ T7490] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 2700.935828][ T7490] rtmsg_ifinfo+0x8d/0xa0 [ 2700.940133][ T7490] __dev_notify_flags+0x235/0x2c0 [ 2700.945129][ T7490] ? dev_set_rx_mode+0x30/0x40 [ 2700.949869][ T7490] ? dev_change_name+0xa70/0xa70 [ 2700.954785][ T7490] ? dev_set_allmulti+0x30/0x30 [ 2700.959622][ T7490] ? mutex_lock_io_nested+0x1260/0x1260 [ 2700.965195][ T7490] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2700.971414][ T7490] dev_change_flags+0x10d/0x170 [ 2700.976239][ T7490] dev_ifsioc+0x2aa/0xa00 [ 2700.980546][ T7490] ? full_name_hash+0xc0/0x100 [ 2700.985299][ T7490] ? register_gifconf+0x70/0x70 [ 2700.990129][ T7490] dev_ioctl+0x1b2/0xc68 [ 2700.994347][ T7490] sock_do_ioctl+0x1b7/0x2f0 [ 2700.998922][ T7490] ? compat_ifr_data_ioctl+0x160/0x160 [ 2701.004374][ T7490] ? trace_hardirqs_on+0x67/0x240 [ 2701.009389][ T7490] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2701.015608][ T7490] ? tomoyo_path_number_perm+0x263/0x520 [ 2701.021221][ T7490] sock_ioctl+0x3ed/0x780 [ 2701.025525][ T7490] ? dlci_ioctl_set+0x40/0x40 [ 2701.030181][ T7490] ? __kasan_check_read+0x11/0x20 [ 2701.035182][ T7490] ? dlci_ioctl_set+0x40/0x40 [ 2701.039847][ T7490] do_vfs_ioctl+0xdb6/0x13e0 [ 2701.044417][ T7490] ? ioctl_preallocate+0x210/0x210 [ 2701.049505][ T7490] ? __fget+0x384/0x560 [ 2701.053641][ T7490] ? ksys_dup3+0x3e0/0x3e0 [ 2701.058033][ T7490] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2701.064253][ T7490] ? fput_many+0x12c/0x1a0 [ 2701.068651][ T7490] ? tomoyo_file_ioctl+0x23/0x30 [ 2701.073574][ T7490] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2701.079791][ T7490] ? security_file_ioctl+0x8d/0xc0 [ 2701.084877][ T7490] ksys_ioctl+0xab/0xd0 [ 2701.089010][ T7490] __x64_sys_ioctl+0x73/0xb0 [ 2701.093581][ T7490] do_syscall_64+0xfd/0x6a0 [ 2701.098070][ T7490] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2701.103935][ T7490] RIP: 0033:0x4598e9 [ 2701.107805][ T7490] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2701.127379][ T7490] RSP: 002b:00007f3dbc201c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2701.135776][ T7490] RAX: ffffffffffffffda RBX: 00007f3dbc201c90 RCX: 00000000004598e9 [ 2701.143721][ T7490] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 2701.151671][ T7490] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2701.159626][ T7490] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc2026d4 [ 2701.167575][ T7490] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 04:40:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400aa2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:45 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xffffffffa0008000) 04:40:45 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x80ffff, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(0x0, r2, 0x7, r1, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000003c0)=r2, 0x12) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = getpid() perf_event_open(0x0, r6, 0x7, r5, 0x0) r7 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r7, &(0x7f00000003c0)=r6, 0x12) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = getpid() perf_event_open(0x0, r9, 0x7, r8, 0x0) r10 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = getpid() perf_event_open(0x0, r11, 0x7, r10, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r10, 0x0, 0x17, &(0x7f0000000140)='wlan0!eth1eth0(.cgroup\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r6, r8, 0x0, 0x2, &(0x7f0000000100)='$\x00', r12}, 0x30) openat$cgroup_type(r4, 0x0, 0x2, 0x0) r13 = getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffff9c, 0xc0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, &(0x7f0000000480)={0x1, 0x2}, 0x0, 0x0, &(0x7f00000005c0)={0x3, 0x6, 0x401, 0x5}, &(0x7f0000000600)=0x1010000000000, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r13, r4, 0x0, 0x2, &(0x7f0000000400)='.\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='memory.events\x00', r14}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x3, [@volatile={0x6, 0x0, 0x0, 0x9, 0x2}, @const={0x6, 0x0, 0x0, 0xa, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x5fc}}, @restrict={0x7, 0x0, 0x0, 0xb, 0x4}, @restrict={0xb, 0x0, 0x0, 0xb, 0x2}, @int={0xa, 0x0, 0x0, 0x1, 0x0, 0x28, 0x0, 0x73, 0xa}, @restrict={0x7, 0x0, 0x0, 0xb, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000300)=""/87, 0x7f, 0x57}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r15, 0x40082406, &(0x7f00000000c0)='#self\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x40020a) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:40:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000370c0000000000001402000018150000", @ANYRES32=0x1, @ANYBLOB="000000000000000009000000000000008000000095000000000000009500"/40], &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xa500000000000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2701.443751][ T7514] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:45 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x1000000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:45 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xffffffffa0018000) 04:40:45 executing program 0 (fault-call:5 fault-nth:11): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:45 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x2000000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:45 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xffffffffa0030000) [ 2701.737911][ T7515] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 04:40:45 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0xfffffffffffff000) [ 2701.939139][ T7532] device nr0 entered promiscuous mode [ 2701.947433][ T7532] FAULT_INJECTION: forcing a failure. [ 2701.947433][ T7532] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2701.960633][ T7532] CPU: 0 PID: 7532 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2701.968413][ T7532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2701.978452][ T7532] Call Trace: [ 2701.981735][ T7532] dump_stack+0x172/0x1f0 [ 2701.986053][ T7532] should_fail.cold+0xa/0x15 [ 2701.990635][ T7532] ? fault_create_debugfs_attr+0x180/0x180 [ 2701.996420][ T7532] ? save_stack+0x5c/0x90 [ 2702.000726][ T7532] ? save_stack+0x23/0x90 [ 2702.005046][ T7532] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2702.010826][ T7532] ? kasan_slab_alloc+0xf/0x20 [ 2702.015565][ T7532] ? kmem_cache_alloc_node+0x138/0x740 [ 2702.021000][ T7532] ? __alloc_skb+0xd5/0x5e0 [ 2702.025584][ T7532] ? rtmsg_ifinfo_build_skb+0x74/0x190 [ 2702.031038][ T7532] should_fail_alloc_page+0x50/0x60 [ 2702.036214][ T7532] __alloc_pages_nodemask+0x1a1/0x900 [ 2702.041736][ T7532] ? __x64_sys_ioctl+0x73/0xb0 [ 2702.046477][ T7532] ? do_syscall_64+0xfd/0x6a0 [ 2702.051134][ T7532] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2702.057186][ T7532] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2702.062889][ T7532] ? finish_task_switch+0x147/0x720 [ 2702.068064][ T7532] ? finish_task_switch+0x119/0x720 [ 2702.073238][ T7532] ? fault_create_debugfs_attr+0x180/0x180 [ 2702.079040][ T7532] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2702.085268][ T7532] cache_grow_begin+0x90/0xd20 [ 2702.090010][ T7532] ? __kmalloc_node_track_caller+0x3d/0x70 [ 2702.095792][ T7532] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2702.102010][ T7532] kmem_cache_alloc_node_trace+0x689/0x750 [ 2702.107792][ T7532] ? kasan_unpoison_shadow+0x35/0x50 [ 2702.113056][ T7532] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2702.118851][ T7532] __kmalloc_node_track_caller+0x3d/0x70 [ 2702.124481][ T7532] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2702.129851][ T7532] __alloc_skb+0x10b/0x5e0 [ 2702.134244][ T7532] ? netdev_alloc_frag+0x1b0/0x1b0 [ 2702.139344][ T7532] ? if_nlmsg_size+0x4ad/0x9e0 [ 2702.144094][ T7532] rtmsg_ifinfo_build_skb+0x74/0x190 [ 2702.149355][ T7532] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 2702.154790][ T7532] rtmsg_ifinfo+0x8d/0xa0 [ 2702.159112][ T7532] __dev_notify_flags+0x235/0x2c0 [ 2702.164122][ T7532] ? dev_set_rx_mode+0x30/0x40 [ 2702.168863][ T7532] ? dev_change_name+0xa70/0xa70 [ 2702.173777][ T7532] ? dev_set_allmulti+0x30/0x30 [ 2702.178613][ T7532] ? mutex_lock_io_nested+0x1260/0x1260 [ 2702.184145][ T7532] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2702.190365][ T7532] dev_change_flags+0x10d/0x170 [ 2702.195206][ T7532] dev_ifsioc+0x2aa/0xa00 [ 2702.199530][ T7532] ? full_name_hash+0xc0/0x100 [ 2702.204281][ T7532] ? register_gifconf+0x70/0x70 [ 2702.209111][ T7532] dev_ioctl+0x1b2/0xc68 [ 2702.213330][ T7532] sock_do_ioctl+0x1b7/0x2f0 [ 2702.217900][ T7532] ? compat_ifr_data_ioctl+0x160/0x160 [ 2702.223336][ T7532] ? trace_hardirqs_on+0x67/0x240 [ 2702.228341][ T7532] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2702.234559][ T7532] ? tomoyo_path_number_perm+0x263/0x520 [ 2702.240181][ T7532] sock_ioctl+0x3ed/0x780 [ 2702.244502][ T7532] ? dlci_ioctl_set+0x40/0x40 [ 2702.249155][ T7532] ? __kasan_check_read+0x11/0x20 [ 2702.254159][ T7532] ? dlci_ioctl_set+0x40/0x40 [ 2702.258827][ T7532] do_vfs_ioctl+0xdb6/0x13e0 [ 2702.263404][ T7532] ? ioctl_preallocate+0x210/0x210 [ 2702.268497][ T7532] ? __fget+0x384/0x560 [ 2702.272644][ T7532] ? ksys_dup3+0x3e0/0x3e0 [ 2702.277083][ T7532] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2702.283316][ T7532] ? fput_many+0x12c/0x1a0 [ 2702.287712][ T7532] ? tomoyo_file_ioctl+0x23/0x30 [ 2702.292631][ T7532] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2702.298860][ T7532] ? security_file_ioctl+0x8d/0xc0 [ 2702.303964][ T7532] ksys_ioctl+0xab/0xd0 [ 2702.308106][ T7532] __x64_sys_ioctl+0x73/0xb0 [ 2702.312679][ T7532] do_syscall_64+0xfd/0x6a0 [ 2702.317163][ T7532] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2702.323035][ T7532] RIP: 0033:0x4598e9 [ 2702.326909][ T7532] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2702.346490][ T7532] RSP: 002b:00007f3dbc1e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2702.354884][ T7532] RAX: ffffffffffffffda RBX: 00007f3dbc1e0c90 RCX: 00000000004598e9 [ 2702.362836][ T7532] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 2702.370786][ T7532] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2702.378738][ T7532] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc1e16d4 [ 2702.386698][ T7532] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 [ 2702.468279][ T7512] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400ab2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:46 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100), 0x1, 0x0, 0x2eb}, 0x0) 04:40:46 executing program 0 (fault-call:5 fault-nth:12): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:46 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x3000000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2702.743077][ T7515] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2702.970225][ T7557] FAULT_INJECTION: forcing a failure. [ 2702.970225][ T7557] name failslab, interval 1, probability 0, space 0, times 0 [ 2702.991089][ T7557] CPU: 0 PID: 7557 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2702.998909][ T7557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2703.008951][ T7557] Call Trace: [ 2703.012223][ T7557] dump_stack+0x172/0x1f0 [ 2703.016535][ T7557] should_fail.cold+0xa/0x15 [ 2703.021110][ T7557] ? fault_create_debugfs_attr+0x180/0x180 [ 2703.026897][ T7557] ? page_to_nid.part.0+0x20/0x20 [ 2703.031905][ T7557] ? ___might_sleep+0x163/0x280 [ 2703.036735][ T7557] __should_failslab+0x121/0x190 [ 2703.041653][ T7557] should_failslab+0x9/0x14 [ 2703.046130][ T7557] kmem_cache_alloc_node_trace+0x274/0x750 [ 2703.051958][ T7557] ? kasan_unpoison_shadow+0x35/0x50 [ 2703.057221][ T7557] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2703.063050][ T7557] __kmalloc_node+0x3d/0x70 [ 2703.067539][ T7557] kvmalloc_node+0x68/0x100 [ 2703.072059][ T7557] pfifo_fast_init+0x10a/0x390 [ 2703.076799][ T7557] ? dev_deactivate_queue.constprop.0+0x240/0x240 [ 2703.083191][ T7557] qdisc_create_dflt+0x10a/0x1e0 [ 2703.088121][ T7557] dev_activate+0x6f6/0xb30 [ 2703.092602][ T7557] __dev_open+0x2b8/0x3f0 [ 2703.096920][ T7557] ? dev_set_rx_mode+0x40/0x40 [ 2703.101667][ T7557] ? __local_bh_enable_ip+0x15a/0x270 [ 2703.107015][ T7557] __dev_change_flags+0x565/0x6e0 [ 2703.112019][ T7557] ? dev_set_allmulti+0x30/0x30 [ 2703.116884][ T7557] ? mutex_lock_io_nested+0x1260/0x1260 [ 2703.122418][ T7557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2703.128665][ T7557] dev_change_flags+0x92/0x170 [ 2703.133423][ T7557] dev_ifsioc+0x2aa/0xa00 [ 2703.137744][ T7557] ? register_gifconf+0x70/0x70 [ 2703.142596][ T7557] dev_ioctl+0x1b2/0xc68 [ 2703.146817][ T7557] sock_do_ioctl+0x1b7/0x2f0 [ 2703.151382][ T7557] ? compat_ifr_data_ioctl+0x160/0x160 [ 2703.156816][ T7557] ? trace_hardirqs_on+0x67/0x240 [ 2703.161837][ T7557] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2703.168080][ T7557] ? tomoyo_path_number_perm+0x263/0x520 [ 2703.173689][ T7557] sock_ioctl+0x3ed/0x780 [ 2703.177996][ T7557] ? dlci_ioctl_set+0x40/0x40 [ 2703.182653][ T7557] ? __kasan_check_read+0x11/0x20 [ 2703.187655][ T7557] ? dlci_ioctl_set+0x40/0x40 [ 2703.192308][ T7557] do_vfs_ioctl+0xdb6/0x13e0 [ 2703.196892][ T7557] ? ioctl_preallocate+0x210/0x210 [ 2703.201987][ T7557] ? __fget+0x384/0x560 [ 2703.206122][ T7557] ? ksys_dup3+0x3e0/0x3e0 [ 2703.210513][ T7557] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2703.216729][ T7557] ? fput_many+0x12c/0x1a0 [ 2703.221124][ T7557] ? tomoyo_file_ioctl+0x23/0x30 [ 2703.226038][ T7557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2703.232254][ T7557] ? security_file_ioctl+0x8d/0xc0 [ 2703.237354][ T7557] ksys_ioctl+0xab/0xd0 [ 2703.241495][ T7557] __x64_sys_ioctl+0x73/0xb0 [ 2703.246115][ T7557] do_syscall_64+0xfd/0x6a0 [ 2703.250610][ T7557] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2703.256477][ T7557] RIP: 0033:0x4598e9 [ 2703.260350][ T7557] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2703.279927][ T7557] RSP: 002b:00007f3dbc1bfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2703.288312][ T7557] RAX: ffffffffffffffda RBX: 00007f3dbc1bfc90 RCX: 00000000004598e9 [ 2703.296261][ T7557] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 2703.304216][ T7557] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 2703.312173][ T7557] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc1c06d4 [ 2703.320122][ T7557] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 [ 2703.334621][ T7557] nr0: activation failed [ 2703.338968][ T7557] device nr0 entered promiscuous mode [ 2703.363697][ T7556] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xc00e000000000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:47 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x2, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=""/24, 0xfffffffffffffd4b}, 0x2) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0xfffffffffffffe6b, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='bdev)\\@/vboxnet1{bdev\x00') 04:40:47 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x4000000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e00000052008100a00f80ecdb4cb904024865160b00010000000000000004000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0xa785076bae236762, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_type(r3, 0x0, 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r3, r2, 0x8, 0x1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r4 = getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffff9c, 0xc0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, &(0x7f0000000480)={0x1, 0x2}, 0x0, 0x0, &(0x7f00000005c0)={0x3, 0x6, 0x401, 0x5}, &(0x7f0000000600)=0x1010000000000, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r4, r3, 0x0, 0x2, &(0x7f0000000400)='.\x00', r5}, 0x30) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r5, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000580)={r1, r6}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x422400, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r7, 0x400454d0, 0xb) ioctl$TUNDETACHFILTER(r7, 0x401054d6, 0x0) 04:40:47 executing program 0 (fault-call:5 fault-nth:13): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 2703.580554][ T7570] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. 04:40:47 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x5000000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x2, 0x1ff}]}}, &(0x7f00000001c0)=""/157, 0x26, 0x9d, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x8, [@int={0x3, 0x0, 0x0, 0x1, 0x0, 0x1e, 0x0, 0x4e, 0x2}, @fwd={0xf}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5, 0x8}}]}, {0x0, [0x61, 0x2e, 0x0, 0x0, 0x30, 0x30]}}, &(0x7f0000000100)=""/144, 0x54, 0x90}, 0x20) 04:40:47 executing program 4: r0 = socket$kcm(0xa, 0x1002, 0x11) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) sendmsg$kcm(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001400), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000013c0)={&(0x7f0000001440)='&\x00', r1}, 0x36a) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(0x0, r5, 0x7, r4, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x3, 0x70, 0x1ff, 0x8, 0x2, 0xffffffff00000001, 0x0, 0x8, 0x1a01, 0x8, 0x8, 0xffff, 0x80000001, 0x5a, 0x7fffffff, 0x7, 0x7, 0xd85, 0x80000001, 0x7fffffff, 0xd44, 0x2, 0x8001, 0x4, 0x3ff, 0x2, 0x952, 0x2, 0x1000, 0x40, 0x80000001, 0x2, 0xde0, 0x6fd2, 0x1, 0x5, 0x1, 0x20, 0x0, 0xd4, 0x4, @perf_bp, 0x2, 0x2, 0x80000000, 0x2, 0x8000, 0x4, 0x3f}, r3, 0xe, r4, 0xa) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8935, &(0x7f00000004c0)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00\x00\x00\x7f\x00\x80\x00\x00\n\xf4D3A}\xe4\xac\xff\x82q\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') sendmsg$tipc(r2, &(0x7f0000002400)={0x0, 0x0, &(0x7f0000002300)=[{&(0x7f00000022c0)="348d163a1c6015026ef92a627ae16a3685f3a0edeec43035bdde159110ab9e90add0fd5a7029d7127dc44f56c2673f", 0x2f}], 0x1, 0x0, 0x0, 0x4000000}, 0x40044) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0x0, 0x8001, 0xb390af31ed3edf49}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001380)={r7, &(0x7f00000012c0)="999e4b4fe55750b53d64662534ff6f0697bf251a397f7db18478c7fab0bc642fffd427ce37d15f73c47b9de7fd8c6b44d6e9203bd53266e45cd934ecdb285445c88d2e914211cfd3b4cd8dc783241fda9cc8488f55b6ded7391c35752c3911c4f92c3c588d3fa7d308e2402a0a58cdd392e604d5f58c9e"}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='\x03\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00', 0x0, 0x0) r8 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 2703.856707][ T7578] device nr0 entered promiscuous mode [ 2703.865230][ T7578] FAULT_INJECTION: forcing a failure. [ 2703.865230][ T7578] name failslab, interval 1, probability 0, space 0, times 0 [ 2703.878256][ T7578] CPU: 1 PID: 7578 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2703.886070][ T7578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2703.896114][ T7578] Call Trace: [ 2703.899393][ T7578] dump_stack+0x172/0x1f0 [ 2703.903720][ T7578] should_fail.cold+0xa/0x15 [ 2703.908306][ T7578] ? fault_create_debugfs_attr+0x180/0x180 [ 2703.914098][ T7578] ? inet6_fill_ifla6_attrs+0x1a9d/0x1fe0 [ 2703.919807][ T7578] ? __local_bh_enable_ip+0x15a/0x270 [ 2703.925171][ T7578] __should_failslab+0x121/0x190 [ 2703.930101][ T7578] should_failslab+0x9/0x14 [ 2703.934602][ T7578] kmem_cache_alloc_node_trace+0x5a/0x750 [ 2703.940311][ T7578] ? __snmp6_fill_stats64.isra.0+0x250/0x250 [ 2703.946277][ T7578] ? memset+0x32/0x40 [ 2703.950253][ T7578] ? lock_downgrade+0x920/0x920 [ 2703.955102][ T7578] __kmalloc_node_track_caller+0x3d/0x70 [ 2703.960746][ T7578] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2703.966110][ T7578] pskb_expand_head+0x151/0xe00 [ 2703.970957][ T7578] netlink_trim+0x218/0x270 [ 2703.975465][ T7578] netlink_broadcast_filtered+0x68/0xb80 [ 2703.981092][ T7578] nlmsg_notify+0x93/0x1c0 [ 2703.985504][ T7578] rtmsg_ifinfo_event.part.0+0xb0/0xe0 [ 2703.990952][ T7578] rtmsg_ifinfo+0x8d/0xa0 [ 2703.995277][ T7578] __dev_notify_flags+0x235/0x2c0 [ 2704.000287][ T7578] ? dev_set_rx_mode+0x30/0x40 [ 2704.005044][ T7578] ? dev_change_name+0xa70/0xa70 [ 2704.009972][ T7578] ? dev_set_allmulti+0x30/0x30 [ 2704.014811][ T7578] ? mutex_lock_io_nested+0x1260/0x1260 [ 2704.020350][ T7578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2704.026584][ T7578] dev_change_flags+0x10d/0x170 [ 2704.031425][ T7578] dev_ifsioc+0x2aa/0xa00 [ 2704.035743][ T7578] ? full_name_hash+0xc0/0x100 [ 2704.040494][ T7578] ? register_gifconf+0x70/0x70 [ 2704.045343][ T7578] dev_ioctl+0x1b2/0xc68 [ 2704.049576][ T7578] sock_do_ioctl+0x1b7/0x2f0 [ 2704.054162][ T7578] ? compat_ifr_data_ioctl+0x160/0x160 [ 2704.059604][ T7578] ? trace_hardirqs_on+0x67/0x240 [ 2704.064625][ T7578] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2704.070855][ T7578] ? tomoyo_path_number_perm+0x263/0x520 [ 2704.076480][ T7578] sock_ioctl+0x3ed/0x780 [ 2704.080802][ T7578] ? dlci_ioctl_set+0x40/0x40 [ 2704.085468][ T7578] ? __kasan_check_read+0x11/0x20 [ 2704.090483][ T7578] ? dlci_ioctl_set+0x40/0x40 [ 2704.095147][ T7578] do_vfs_ioctl+0xdb6/0x13e0 [ 2704.099727][ T7578] ? ioctl_preallocate+0x210/0x210 [ 2704.104822][ T7578] ? __fget+0x384/0x560 [ 2704.108970][ T7578] ? ksys_dup3+0x3e0/0x3e0 [ 2704.113377][ T7578] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2704.119604][ T7578] ? fput_many+0x12c/0x1a0 [ 2704.124011][ T7578] ? tomoyo_file_ioctl+0x23/0x30 [ 2704.128940][ T7578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2704.135176][ T7578] ? security_file_ioctl+0x8d/0xc0 [ 2704.140278][ T7578] ksys_ioctl+0xab/0xd0 [ 2704.144420][ T7578] __x64_sys_ioctl+0x73/0xb0 [ 2704.149005][ T7578] do_syscall_64+0xfd/0x6a0 [ 2704.153496][ T7578] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2704.159373][ T7578] RIP: 0033:0x4598e9 [ 2704.163261][ T7578] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2704.182847][ T7578] RSP: 002b:00007f3dbc201c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2704.191244][ T7578] RAX: ffffffffffffffda RBX: 00007f3dbc201c90 RCX: 00000000004598e9 [ 2704.199198][ T7578] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 2704.207202][ T7578] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2704.215158][ T7578] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc2026d4 [ 2704.223113][ T7578] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 04:40:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400ac2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:48 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x6000000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/112, 0x70}, {&(0x7f00000001c0)=""/100, 0x64}, {&(0x7f00000000c0)=""/27, 0x1b}, {&(0x7f0000000240)=""/12, 0xc}, {&(0x7f0000000300)=""/72, 0x48}, {&(0x7f0000000380)=""/17, 0x11}], 0x6, &(0x7f0000000440)=""/196, 0xc4}, 0x18002) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 04:40:48 executing program 0 (fault-call:5 fault-nth:14): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:48 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x7000000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xf0ffffff00000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0xb) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r2 = socket$kcm(0x10, 0x3, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 2704.756596][ T7602] device nr0 entered promiscuous mode [ 2704.789701][ T7602] FAULT_INJECTION: forcing a failure. [ 2704.789701][ T7602] name failslab, interval 1, probability 0, space 0, times 0 04:40:48 executing program 4: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f00000001c0)='veth0\x00') recvmsg$kcm(r2, &(0x7f0000000a00)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000840)=""/185, 0xb9}, {&(0x7f0000000100)=""/76, 0x4c}, {&(0x7f00000003c0)=""/106, 0x6a}], 0x3, &(0x7f0000000940)=""/137, 0x89}, 0x10000) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r4, &(0x7f0000002bc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r4, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) recvmsg(r4, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) r5 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000180)={r0}) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x7, &(0x7f00000005c0)=ANY=[@ANYBLOB="d5709800fcffffff18100000", @ANYRES32, @ANYBLOB="00000000000000cfaf56f3241b5db83fb7a60085e8ffff0a00000018000000030000000000000001"], &(0x7f0000000640)='GPL\x00', 0xfffffffffffffffb, 0x65, &(0x7f0000000680)=""/101, 0x41100, 0x5, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x0, 0x1, 0x5}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000800)={r6, r7, 0x0, 0x3}, 0x10) r8 = perf_event_open(&(0x7f00004e7000)={0x2, 0x229, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x11) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x00\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') r9 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) sendmsg$kcm(r4, &(0x7f0000000580)={&(0x7f0000000200)=@tipc=@name={0x1e, 0x2, 0x3, {{0x42}, 0x4}}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)="eac56e61b64c909c55e4aa08e9dbb08fda1613d4a33a6d3b4c9e7b3603c43bba69458752f6f8384aad5a5ee3b0d92e5e0128d63af95d78bfb976a2688123e4f2e48116c268a449f4edfdc775c4fc28cd3311b23ed136ef596f99100bc8e3a885cc50ed3dd6bc24677ce311398f422723a99bd6c3412f4145667ba5e42d6c2ce1e94744d6c35a7fa41f8e5a25ba3b2961100311b8872ecc11277177a54d", 0x9d}], 0x1}, 0x800) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890b, &(0x7f0000000000)) recvmsg$kcm(r3, &(0x7f000000a400)={&(0x7f000000a1c0)=@can, 0x80, &(0x7f000000a300)=[{&(0x7f000000a240)=""/155, 0x9b}], 0x1, &(0x7f000000a340)=""/141, 0x8d}, 0x122) [ 2704.812906][ T7602] CPU: 1 PID: 7602 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2704.820724][ T7602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2704.830773][ T7602] Call Trace: [ 2704.834068][ T7602] dump_stack+0x172/0x1f0 [ 2704.838392][ T7602] should_fail.cold+0xa/0x15 [ 2704.842970][ T7602] ? fault_create_debugfs_attr+0x180/0x180 [ 2704.848800][ T7602] ? page_to_nid.part.0+0x20/0x20 [ 2704.853814][ T7602] ? ___might_sleep+0x163/0x280 [ 2704.858675][ T7602] __should_failslab+0x121/0x190 [ 2704.863616][ T7602] should_failslab+0x9/0x14 [ 2704.868114][ T7602] kmem_cache_alloc_trace+0x2d3/0x790 [ 2704.873472][ T7602] ? perf_trace_lock_acquire+0xf5/0x530 [ 2704.878995][ T7602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2704.885228][ T7602] ____ip_mc_inc_group+0x282/0xc30 [ 2704.890335][ T7602] ? ip_mc_add_src+0xf60/0xf60 [ 2704.895087][ T7602] ? __kasan_check_read+0x11/0x20 [ 2704.900100][ T7602] ip_mc_up+0x141/0x360 [ 2704.904233][ T7602] inetdev_event+0x727/0x1470 [ 2704.908892][ T7602] ? update_gid_event_work_handler+0xc0/0xc0 [ 2704.914854][ T7602] ? inetdev_init+0x470/0x470 [ 2704.919528][ T7602] notifier_call_chain+0xc2/0x230 [ 2704.924562][ T7602] ? notifier_call_chain+0xc2/0x230 [ 2704.929739][ T7602] raw_notifier_call_chain+0x2e/0x40 [ 2704.935016][ T7602] call_netdevice_notifiers_info+0x3f/0x90 [ 2704.940803][ T7602] __dev_notify_flags+0x121/0x2c0 [ 2704.945802][ T7602] ? dev_set_rx_mode+0x30/0x40 [ 2704.950545][ T7602] ? dev_change_name+0xa70/0xa70 [ 2704.955465][ T7602] ? dev_set_allmulti+0x30/0x30 [ 2704.960301][ T7602] ? security_file_ioctl+0x77/0xc0 [ 2704.965391][ T7602] ? mutex_lock_io_nested+0x1260/0x1260 [ 2704.970912][ T7602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2704.977132][ T7602] dev_change_flags+0x10d/0x170 [ 2704.981960][ T7602] dev_ifsioc+0x2aa/0xa00 [ 2704.986269][ T7602] ? full_name_hash+0xc0/0x100 [ 2704.991020][ T7602] ? register_gifconf+0x70/0x70 [ 2704.995873][ T7602] dev_ioctl+0x1b2/0xc68 [ 2705.000260][ T7602] sock_do_ioctl+0x1b7/0x2f0 [ 2705.004835][ T7602] ? compat_ifr_data_ioctl+0x160/0x160 [ 2705.010271][ T7602] ? trace_hardirqs_on+0x67/0x240 [ 2705.015275][ T7602] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2705.021495][ T7602] ? tomoyo_path_number_perm+0x263/0x520 [ 2705.027108][ T7602] sock_ioctl+0x3ed/0x780 [ 2705.031413][ T7602] ? dlci_ioctl_set+0x40/0x40 [ 2705.036070][ T7602] ? __kasan_check_read+0x11/0x20 [ 2705.041073][ T7602] ? dlci_ioctl_set+0x40/0x40 [ 2705.045738][ T7602] do_vfs_ioctl+0xdb6/0x13e0 [ 2705.050332][ T7602] ? ioctl_preallocate+0x210/0x210 [ 2705.055429][ T7602] ? __fget+0x384/0x560 [ 2705.059577][ T7602] ? ksys_dup3+0x3e0/0x3e0 [ 2705.063994][ T7602] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2705.070222][ T7602] ? fput_many+0x12c/0x1a0 [ 2705.074616][ T7602] ? tomoyo_file_ioctl+0x23/0x30 [ 2705.079540][ T7602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2705.085760][ T7602] ? security_file_ioctl+0x8d/0xc0 [ 2705.090847][ T7602] ksys_ioctl+0xab/0xd0 [ 2705.094980][ T7602] __x64_sys_ioctl+0x73/0xb0 [ 2705.099551][ T7602] do_syscall_64+0xfd/0x6a0 [ 2705.104034][ T7602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2705.109899][ T7602] RIP: 0033:0x4598e9 [ 2705.113781][ T7602] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2705.133374][ T7602] RSP: 002b:00007f3dbc201c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2705.141775][ T7602] RAX: ffffffffffffffda RBX: 00007f3dbc201c90 RCX: 00000000004598e9 [ 2705.149739][ T7602] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 2705.157689][ T7602] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2705.165637][ T7602] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc2026d4 [ 2705.173585][ T7602] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 04:40:49 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x8000000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:49 executing program 4: r0 = socket$kcm(0x10, 0x4000000000001, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="1c0000002c008151e00f80ecdb4cb904014865160b0001410b000000", 0x1c}], 0x1}, 0x0) [ 2705.258469][ T7626] __nla_validate_parse: 7 callbacks suppressed [ 2705.258478][ T7626] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:49 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 04:40:49 executing program 0 (fault-call:5 fault-nth:15): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400ad2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:40:49 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xa000000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2705.549939][ T7631] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000015c0)='rdmi.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000003c0)=ANY=[@ANYBLOB="a39f2e2eef8b17aaeac30508ec85303f02000000e71dda39012bf393e670f0a858b34f92fb5b79299eb8c14578d9e0d5a2f056f16a58d7c987f465a4da3e96ee032cc5da9194f6d8d12adb1918aeb6f3d1a75ac9de2fc10f695be0b064b3d03fb1cfc2601a0e38369d5e6811d83a8ad5d0cadfa851e54b5e4c481165e46c004d0019e6119bcfea20438c2ae8cd79892fdfca8455ae8fe559cf065850cde0d8264f5304fd8350b8238c08234f1b98667a5a582c5c8c0001f2ffde7ce8a8f56fbd51986a008f3e5f38"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x100, 0x10}, 0xc) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(r1, &(0x7f0000000240)='pids.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="002386dd20"], 0xfdef) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)={0x1, 0x1, [@empty]}) socket$kcm(0xa, 0x200000000000001, 0x0) 04:40:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xffffff7f00000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2705.645067][ T7641] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:49 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xe020000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2705.970180][ T7654] device nr0 entered promiscuous mode [ 2705.980380][ T7654] FAULT_INJECTION: forcing a failure. [ 2705.980380][ T7654] name failslab, interval 1, probability 0, space 0, times 0 [ 2705.997552][ T7654] CPU: 0 PID: 7654 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2706.005348][ T7654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2706.015386][ T7654] Call Trace: [ 2706.018661][ T7654] dump_stack+0x172/0x1f0 [ 2706.022975][ T7654] should_fail.cold+0xa/0x15 [ 2706.027552][ T7654] ? fault_create_debugfs_attr+0x180/0x180 [ 2706.033337][ T7654] ? page_to_nid.part.0+0x20/0x20 [ 2706.038350][ T7654] ? ___might_sleep+0x163/0x280 [ 2706.043206][ T7654] __should_failslab+0x121/0x190 [ 2706.048126][ T7654] should_failslab+0x9/0x14 [ 2706.052622][ T7654] kmem_cache_alloc_trace+0x2d3/0x790 [ 2706.057977][ T7654] fib6_info_alloc+0xb6/0x1b0 [ 2706.062634][ T7654] ip6_route_info_create+0x2fe/0x1530 [ 2706.068003][ T7654] ? lock_downgrade+0x920/0x920 [ 2706.072846][ T7654] ip6_route_add+0x27/0xc0 [ 2706.077271][ T7654] addrconf_add_mroute+0x236/0x320 [ 2706.082387][ T7654] ? ipv6_count_addresses+0x200/0x200 [ 2706.087735][ T7654] ? mld_del_delrec+0x2e2/0x550 [ 2706.092576][ T7654] ? _raw_read_unlock_bh+0x31/0x40 [ 2706.097678][ T7654] ? ipv6_mc_up+0x9b/0xc0 [ 2706.102013][ T7654] addrconf_add_dev+0x164/0x1d0 [ 2706.106852][ T7654] addrconf_dev_config+0x178/0x2c0 [ 2706.111945][ T7654] addrconf_notify+0x3bf/0x23b0 [ 2706.116781][ T7654] ? lock_downgrade+0x920/0x920 [ 2706.121613][ T7654] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2706.127862][ T7654] ? inet6_ifinfo_notify+0x150/0x150 [ 2706.133144][ T7654] ? tls_device_gc_task+0x550/0x550 [ 2706.138328][ T7654] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2706.144559][ T7654] ? ip6mr_device_event+0x1ad/0x220 [ 2706.149932][ T7654] notifier_call_chain+0xc2/0x230 [ 2706.154950][ T7654] ? notifier_call_chain+0xc2/0x230 [ 2706.160140][ T7654] raw_notifier_call_chain+0x2e/0x40 [ 2706.165408][ T7654] call_netdevice_notifiers_info+0x3f/0x90 [ 2706.171211][ T7654] __dev_notify_flags+0x121/0x2c0 [ 2706.176222][ T7654] ? dev_set_rx_mode+0x30/0x40 [ 2706.180974][ T7654] ? dev_change_name+0xa70/0xa70 [ 2706.185898][ T7654] ? dev_set_allmulti+0x30/0x30 [ 2706.190727][ T7654] ? mutex_lock_io_nested+0x1260/0x1260 [ 2706.196249][ T7654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2706.202520][ T7654] dev_change_flags+0x10d/0x170 [ 2706.207350][ T7654] dev_ifsioc+0x2aa/0xa00 [ 2706.211660][ T7654] ? full_name_hash+0xc0/0x100 [ 2706.216504][ T7654] ? register_gifconf+0x70/0x70 [ 2706.221346][ T7654] dev_ioctl+0x1b2/0xc68 [ 2706.225582][ T7654] sock_do_ioctl+0x1b7/0x2f0 [ 2706.230174][ T7654] ? compat_ifr_data_ioctl+0x160/0x160 [ 2706.235626][ T7654] ? trace_hardirqs_on+0x67/0x240 [ 2706.240649][ T7654] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2706.246874][ T7654] ? tomoyo_path_number_perm+0x263/0x520 [ 2706.252586][ T7654] sock_ioctl+0x3ed/0x780 [ 2706.256906][ T7654] ? dlci_ioctl_set+0x40/0x40 [ 2706.261764][ T7654] ? __kasan_check_read+0x11/0x20 [ 2706.266802][ T7654] ? dlci_ioctl_set+0x40/0x40 [ 2706.271479][ T7654] do_vfs_ioctl+0xdb6/0x13e0 [ 2706.276065][ T7654] ? ioctl_preallocate+0x210/0x210 [ 2706.281172][ T7654] ? __fget+0x384/0x560 [ 2706.285312][ T7654] ? ksys_dup3+0x3e0/0x3e0 [ 2706.289722][ T7654] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2706.296133][ T7654] ? fput_many+0x12c/0x1a0 [ 2706.300543][ T7654] ? tomoyo_file_ioctl+0x23/0x30 [ 2706.305471][ T7654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2706.311692][ T7654] ? security_file_ioctl+0x8d/0xc0 [ 2706.316784][ T7654] ksys_ioctl+0xab/0xd0 [ 2706.320930][ T7654] __x64_sys_ioctl+0x73/0xb0 [ 2706.325511][ T7654] do_syscall_64+0xfd/0x6a0 [ 2706.330011][ T7654] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2706.335893][ T7654] RIP: 0033:0x4598e9 [ 2706.339767][ T7654] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2706.359347][ T7654] RSP: 002b:00007f3dbc1e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2706.367745][ T7654] RAX: ffffffffffffffda RBX: 00007f3dbc1e0c90 RCX: 00000000004598e9 [ 2706.375696][ T7654] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 2706.383648][ T7654] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2706.391607][ T7654] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc1e16d4 [ 2706.399581][ T7654] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 [ 2706.413719][ T7655] device nr0 entered promiscuous mode 04:40:50 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xf000000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2706.440413][ T7659] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(0x0, r2, 0x7, r1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x1, &(0x7f0000000040)='\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x6, 0x7b, 0xff, 0x114f4b7a, 0x0, 0xbaca, 0x3c02, 0x2, 0x0, 0x4, 0x800000000000000, 0xffff, 0x9c, 0xffffffff, 0xf3, 0x58f, 0xffffffffffff4c38, 0x1ff, 0x100000001, 0x2, 0x9, 0x4, 0x940, 0xa9fb, 0x0, 0x5, 0x1, 0x9e, 0x7, 0x2, 0x1000, 0x7, 0x0, 0xfffffffffffffffb, 0x10000, 0x9, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000000), 0xa}, 0xc024, 0x40, 0x781b, 0x9, 0x8, 0xfbc}, r3, 0xd, 0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 2706.548608][ T7668] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 04:40:50 executing program 0 (fault-call:5 fault-nth:16): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:50 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x10000000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400ae2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) [ 2706.869476][ T7670] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xffffffff00000000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:50 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) r2 = socket$kcm(0xa, 0x6, 0x0) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)="9b81cd3c3715f0048fbd916f0cf1793f8141ece65422add7c0d73fe27502b6a6aa471b454dd717d3da4432c7297db8f4981f828fe0cc6b5f2aa7c2ab58c3edd842fc96a792cd7e29a4f3893e25e059ec17c53ff2f3641e7362c839080e72de9706ac8fd3723158fa9e5900e88450cb43543b7134b6ab55aff3ee386a4a62a54ad374261d4f4c11849ebb15ac6104ec6760b655cf3226182964cdaf16331ae592702cb0e6fae0757e4f995346494052e9", 0xb0}, {0x0}], 0x2, 0x0, 0x0, 0x20004010}, 0x0) sendmsg$kcm(r2, 0x0, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, 0x0, 0xfffffffffffffe6b) recvmsg$kcm(r2, &(0x7f0000000380)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000000340)=[{&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x2}, 0x40000041) sendmsg(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000040)="e8e5504676fd54f99a8ba425adc423cce7d2cba1334153da8c117985b5a86ac06d0f97ed5983a282dbf20babd5ba7856084587fd9a", 0x35}], 0x1}, 0x20004010) recvmsg$kcm(r2, &(0x7f0000006900)={&(0x7f0000006640)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000067c0)=[{&(0x7f00000066c0)=""/107, 0x6b}, {&(0x7f0000006740)=""/96, 0x60}], 0x2, &(0x7f0000006800)=""/218, 0xda}, 0x100) bpf$MAP_CREATE(0x0, &(0x7f0000006940)={0x15, 0x0, 0x8, 0x100000000, 0x2, r3, 0x5, [], r4, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000003880)={0xc, 0x0, &(0x7f0000002780), &(0x7f00000027c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000002800)=""/4096, 0x41000, 0x5, [], r4, 0x9, r1, 0x8, &(0x7f0000003800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000003840)={0x1, 0x8, 0x8000, 0x6}, 0x10}, 0x70) recvmsg$kcm(r0, &(0x7f0000002740)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000004c0)=""/242, 0xf2}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/206, 0xce}, {&(0x7f00000016c0)=""/4096, 0x1000}], 0x4, &(0x7f00000026c0)=""/125, 0x7d}, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, [@alu={0x7, 0x3, 0xb, 0x2, 0x2, 0x100, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x7a, &(0x7f0000000100)=""/122, 0x41000, 0x5, [], 0x0, 0xf, r1, 0x8, &(0x7f00000003c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0xb, 0x6, 0x4}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000003900)=0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@volatile={0x7}]}, {0x0, [0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/236, 0x29, 0xec, 0x5}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000003a00)='cgroup.stat\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r6, 0x400454de, &(0x7f0000003940)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000003980)=ANY=[@ANYBLOB="9feb010018002000000000000c10000000000000070000000e000000a0020085190b00000030305f002e001bba0104000000000000c25354bbb5518163a430bca36e4c909773fdba86f7eeb5af2efc4b521b755ba51098c61b74a99b3e"], &(0x7f0000000000)=""/48, 0x2b, 0x30}, 0x20) [ 2706.976691][ T7673] device nr0 entered promiscuous mode [ 2706.983521][ T7680] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2707.015300][ T7673] FAULT_INJECTION: forcing a failure. [ 2707.015300][ T7673] name failslab, interval 1, probability 0, space 0, times 0 [ 2707.027953][ T7673] CPU: 1 PID: 7673 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2707.035747][ T7673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2707.045787][ T7673] Call Trace: [ 2707.049081][ T7673] dump_stack+0x172/0x1f0 [ 2707.053420][ T7673] should_fail.cold+0xa/0x15 [ 2707.057994][ T7673] ? fault_create_debugfs_attr+0x180/0x180 [ 2707.063792][ T7673] ? __atomic_notifier_call_chain+0xd6/0x1a0 [ 2707.069754][ T7673] ? __kasan_check_read+0x11/0x20 [ 2707.074760][ T7673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2707.081002][ T7673] ? should_fail+0x1de/0x852 [ 2707.085576][ T7673] __should_failslab+0x121/0x190 [ 2707.090607][ T7673] should_failslab+0x9/0x14 [ 2707.095091][ T7673] kmem_cache_alloc_node_trace+0x5a/0x750 [ 2707.100787][ T7673] ? kasan_unpoison_shadow+0x35/0x50 [ 2707.106053][ T7673] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2707.111843][ T7673] __kmalloc_node_track_caller+0x3d/0x70 [ 2707.117462][ T7673] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2707.122816][ T7673] __alloc_skb+0x10b/0x5e0 [ 2707.127214][ T7673] ? netdev_alloc_frag+0x1b0/0x1b0 [ 2707.132304][ T7673] ? refcount_inc_not_zero_checked+0x144/0x200 [ 2707.138441][ T7673] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 2707.144243][ T7673] inet6_rt_notify+0xf9/0x2b0 [ 2707.148903][ T7673] fib6_add+0x237e/0x3900 [ 2707.153236][ T7673] __ip6_ins_rt+0x54/0x80 [ 2707.157548][ T7673] ip6_route_add+0x5a/0xc0 [ 2707.161946][ T7673] addrconf_add_mroute+0x236/0x320 [ 2707.167037][ T7673] ? ipv6_count_addresses+0x200/0x200 [ 2707.172390][ T7673] ? mld_del_delrec+0x2e2/0x550 [ 2707.177237][ T7673] ? _raw_read_unlock_bh+0x31/0x40 [ 2707.182337][ T7673] ? ipv6_mc_up+0x9b/0xc0 [ 2707.186653][ T7673] addrconf_add_dev+0x164/0x1d0 [ 2707.191498][ T7673] addrconf_dev_config+0x178/0x2c0 [ 2707.196593][ T7673] addrconf_notify+0x3bf/0x23b0 [ 2707.201426][ T7673] ? lock_downgrade+0x920/0x920 [ 2707.206265][ T7673] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2707.212493][ T7673] ? inet6_ifinfo_notify+0x150/0x150 [ 2707.217769][ T7673] ? tls_device_gc_task+0x550/0x550 [ 2707.222948][ T7673] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2707.229167][ T7673] ? ip6mr_device_event+0x1ad/0x220 [ 2707.234361][ T7673] notifier_call_chain+0xc2/0x230 [ 2707.239366][ T7673] ? notifier_call_chain+0xc2/0x230 [ 2707.244547][ T7673] raw_notifier_call_chain+0x2e/0x40 [ 2707.249815][ T7673] call_netdevice_notifiers_info+0x3f/0x90 [ 2707.255606][ T7673] __dev_notify_flags+0x121/0x2c0 [ 2707.260610][ T7673] ? dev_set_rx_mode+0x30/0x40 [ 2707.265353][ T7673] ? dev_change_name+0xa70/0xa70 [ 2707.270271][ T7673] ? dev_set_allmulti+0x30/0x30 [ 2707.275099][ T7673] ? security_file_ioctl+0x77/0xc0 [ 2707.280282][ T7673] ? mutex_lock_io_nested+0x1260/0x1260 [ 2707.285832][ T7673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2707.292074][ T7673] dev_change_flags+0x10d/0x170 [ 2707.296918][ T7673] dev_ifsioc+0x2aa/0xa00 [ 2707.301233][ T7673] ? full_name_hash+0xc0/0x100 [ 2707.305997][ T7673] ? register_gifconf+0x70/0x70 [ 2707.310840][ T7673] dev_ioctl+0x1b2/0xc68 [ 2707.315069][ T7673] sock_do_ioctl+0x1b7/0x2f0 [ 2707.319644][ T7673] ? compat_ifr_data_ioctl+0x160/0x160 [ 2707.325091][ T7673] ? trace_hardirqs_on+0x67/0x240 [ 2707.330102][ T7673] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2707.336343][ T7673] ? tomoyo_path_number_perm+0x263/0x520 [ 2707.341957][ T7673] sock_ioctl+0x3ed/0x780 [ 2707.346278][ T7673] ? dlci_ioctl_set+0x40/0x40 [ 2707.350939][ T7673] ? __kasan_check_read+0x11/0x20 [ 2707.355948][ T7673] ? dlci_ioctl_set+0x40/0x40 [ 2707.360607][ T7673] do_vfs_ioctl+0xdb6/0x13e0 [ 2707.365178][ T7673] ? ioctl_preallocate+0x210/0x210 [ 2707.370278][ T7673] ? __fget+0x384/0x560 [ 2707.374419][ T7673] ? ksys_dup3+0x3e0/0x3e0 [ 2707.378816][ T7673] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2707.385038][ T7673] ? fput_many+0x12c/0x1a0 [ 2707.389436][ T7673] ? tomoyo_file_ioctl+0x23/0x30 [ 2707.394355][ T7673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2707.400581][ T7673] ? security_file_ioctl+0x8d/0xc0 [ 2707.405670][ T7673] ksys_ioctl+0xab/0xd0 [ 2707.409809][ T7673] __x64_sys_ioctl+0x73/0xb0 [ 2707.414394][ T7673] do_syscall_64+0xfd/0x6a0 [ 2707.418882][ T7673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2707.424753][ T7673] RIP: 0033:0x4598e9 [ 2707.428638][ T7673] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2707.448225][ T7673] RSP: 002b:00007f3dbc201c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2707.456628][ T7673] RAX: ffffffffffffffda RBX: 00007f3dbc201c90 RCX: 00000000004598e9 [ 2707.464586][ T7673] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 04:40:51 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x10c30800, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2707.472542][ T7673] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2707.480494][ T7673] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc2026d4 [ 2707.488444][ T7673] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 04:40:51 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x53ad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(0x0, r2, 0x7, r1, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xa0, 0x2, 0x73, 0x0, 0x0, 0x200, 0x10102, 0x6, 0x10001, 0x35, 0x3, 0xdc, 0x7, 0x2765b48b0000000, 0x1, 0xfffffffffffff578, 0x1, 0x4, 0x9, 0xd3, 0x7ff, 0x0, 0x2, 0x200, 0x4, 0x7, 0x7, 0x800, 0x7fff, 0x2, 0x200000000000, 0x100000001, 0x3, 0x7d2b6862, 0x7f, 0x1, 0x0, 0xffff000000000, 0x0, @perf_bp={&(0x7f0000000040), 0x76bb75efae4b9edd}, 0x7e54f03a38ca9d4e, 0xff, 0x5, 0x9, 0xc678, 0x1f, 0x9}, 0x0, 0x9, r1, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x28, &(0x7f0000000300)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={r3, 0xffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r3, 0x20, 0x10}, 0xc) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 04:40:51 executing program 0 (fault-call:5 fault-nth:17): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:51 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000001d008100e00f80ecdb4cb90402c865160b000000d4126efb120001000e00e8e5ff3cda1b40d819a90600", 0x2e}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xb) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'ip6_vti0\x00', 0x1}) write$cgroup_subtree(r2, 0x0, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x4000000000000, 0x27d, 0x0, 0x6, 0x0, 0x3f, 0x81e04, 0x4, 0x4, 0x9, 0x1, 0x0, 0x3, 0x8, 0x10001, 0x2, 0x8001, 0x7, 0x80, 0xfffffffffffffffc, 0x1, 0x8, 0x0, 0x0, 0x3, 0x411, 0x8, 0x8, 0x6, 0x0, 0xea4, 0x1400000, 0x8e9, 0x40, 0x9, 0x3ff, 0x0, 0x48a7, 0x0, @perf_config_ext={0x800, 0x3}, 0x2000, 0x4, 0x81, 0x3, 0x8001, 0x3, 0x4}, r2, 0xe, r0, 0x19) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x3, 0x70, 0xb0, 0x3c5a, 0x7, 0x3, 0x0, 0x4, 0x600, 0x2, 0x4, 0x8001, 0xed, 0x1000, 0xa000000, 0x4, 0x1, 0x5, 0x1, 0x0, 0x400, 0x7, 0x9, 0x0, 0x200, 0x101, 0x20, 0x3f, 0x8, 0x3, 0x4, 0x7, 0x70, 0x8, 0xa991, 0x9, 0x3, 0xfff, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000140), 0x4}, 0x10, 0x7, 0x100000000, 0x9, 0x2, 0xffffffffffffffa8, 0x5}) 04:40:51 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x18000000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2707.875986][ T7694] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2707.905455][ T7695] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2708.057260][ T7708] device nr0 entered promiscuous mode [ 2708.068900][ T7708] FAULT_INJECTION: forcing a failure. [ 2708.068900][ T7708] name failslab, interval 1, probability 0, space 0, times 0 [ 2708.081533][ T7708] CPU: 1 PID: 7708 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2708.089326][ T7708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2708.099371][ T7708] Call Trace: [ 2708.102664][ T7708] dump_stack+0x172/0x1f0 [ 2708.107002][ T7708] should_fail.cold+0xa/0x15 [ 2708.111598][ T7708] ? fault_create_debugfs_attr+0x180/0x180 [ 2708.117410][ T7708] ? __atomic_notifier_call_chain+0xd6/0x1a0 [ 2708.123398][ T7708] ? __kasan_check_read+0x11/0x20 [ 2708.128423][ T7708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2708.134660][ T7708] ? should_fail+0x1de/0x852 [ 2708.139242][ T7708] __should_failslab+0x121/0x190 [ 2708.144180][ T7708] should_failslab+0x9/0x14 [ 2708.148680][ T7708] kmem_cache_alloc_node_trace+0x5a/0x750 [ 2708.154387][ T7708] ? kasan_unpoison_shadow+0x35/0x50 [ 2708.159662][ T7708] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2708.165488][ T7708] __kmalloc_node_track_caller+0x3d/0x70 [ 2708.171124][ T7708] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2708.176499][ T7708] __alloc_skb+0x10b/0x5e0 [ 2708.180905][ T7708] ? netdev_alloc_frag+0x1b0/0x1b0 [ 2708.186005][ T7708] ? refcount_inc_not_zero_checked+0x144/0x200 [ 2708.192149][ T7708] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 2708.197961][ T7708] inet6_rt_notify+0xf9/0x2b0 [ 2708.202641][ T7708] fib6_add+0x237e/0x3900 [ 2708.206972][ T7708] __ip6_ins_rt+0x54/0x80 [ 2708.211295][ T7708] ip6_route_add+0x5a/0xc0 [ 2708.215701][ T7708] addrconf_add_mroute+0x236/0x320 [ 2708.220801][ T7708] ? ipv6_count_addresses+0x200/0x200 [ 2708.226218][ T7708] ? mld_del_delrec+0x2e2/0x550 [ 2708.231073][ T7708] ? _raw_read_unlock_bh+0x31/0x40 [ 2708.236233][ T7708] ? ipv6_mc_up+0x9b/0xc0 [ 2708.240556][ T7708] addrconf_add_dev+0x164/0x1d0 [ 2708.245400][ T7708] addrconf_dev_config+0x178/0x2c0 [ 2708.250501][ T7708] addrconf_notify+0x3bf/0x23b0 [ 2708.255345][ T7708] ? lock_downgrade+0x920/0x920 [ 2708.260190][ T7708] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2708.266429][ T7708] ? inet6_ifinfo_notify+0x150/0x150 [ 2708.271710][ T7708] ? tls_device_gc_task+0x550/0x550 [ 2708.276918][ T7708] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2708.283260][ T7708] ? ip6mr_device_event+0x1ad/0x220 [ 2708.288466][ T7708] notifier_call_chain+0xc2/0x230 [ 2708.293489][ T7708] ? notifier_call_chain+0xc2/0x230 [ 2708.298695][ T7708] raw_notifier_call_chain+0x2e/0x40 [ 2708.303986][ T7708] call_netdevice_notifiers_info+0x3f/0x90 [ 2708.309792][ T7708] __dev_notify_flags+0x121/0x2c0 [ 2708.314802][ T7708] ? dev_set_rx_mode+0x30/0x40 [ 2708.319558][ T7708] ? dev_change_name+0xa70/0xa70 [ 2708.324491][ T7708] ? dev_set_allmulti+0x30/0x30 [ 2708.329331][ T7708] ? mutex_lock_io_nested+0x1260/0x1260 [ 2708.334870][ T7708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2708.341106][ T7708] dev_change_flags+0x10d/0x170 [ 2708.345952][ T7708] dev_ifsioc+0x2aa/0xa00 [ 2708.350270][ T7708] ? full_name_hash+0xc0/0x100 [ 2708.355030][ T7708] ? register_gifconf+0x70/0x70 [ 2708.359885][ T7708] dev_ioctl+0x1b2/0xc68 [ 2708.364132][ T7708] sock_do_ioctl+0x1b7/0x2f0 [ 2708.368721][ T7708] ? compat_ifr_data_ioctl+0x160/0x160 [ 2708.374346][ T7708] ? trace_hardirqs_on+0x67/0x240 [ 2708.379369][ T7708] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2708.385629][ T7708] ? tomoyo_path_number_perm+0x263/0x520 [ 2708.391262][ T7708] sock_ioctl+0x3ed/0x780 [ 2708.395583][ T7708] ? dlci_ioctl_set+0x40/0x40 [ 2708.400255][ T7708] ? __kasan_check_read+0x11/0x20 [ 2708.405282][ T7708] ? dlci_ioctl_set+0x40/0x40 [ 2708.409960][ T7708] do_vfs_ioctl+0xdb6/0x13e0 [ 2708.414552][ T7708] ? ioctl_preallocate+0x210/0x210 [ 2708.419664][ T7708] ? __fget+0x384/0x560 [ 2708.423831][ T7708] ? ksys_dup3+0x3e0/0x3e0 [ 2708.428252][ T7708] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2708.434507][ T7708] ? fput_many+0x12c/0x1a0 [ 2708.438932][ T7708] ? tomoyo_file_ioctl+0x23/0x30 [ 2708.443937][ T7708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2708.450186][ T7708] ? security_file_ioctl+0x8d/0xc0 [ 2708.455313][ T7708] ksys_ioctl+0xab/0xd0 [ 2708.459477][ T7708] __x64_sys_ioctl+0x73/0xb0 [ 2708.464073][ T7708] do_syscall_64+0xfd/0x6a0 [ 2708.468582][ T7708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2708.474475][ T7708] RIP: 0033:0x4598e9 [ 2708.478372][ T7708] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2708.497972][ T7708] RSP: 002b:00007f3dbc1e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2708.506365][ T7708] RAX: ffffffffffffffda RBX: 00007f3dbc1e0c90 RCX: 00000000004598e9 [ 2708.514325][ T7708] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 2708.522302][ T7708] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2708.530263][ T7708] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc1e16d4 [ 2708.538233][ T7708] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 04:40:52 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x1c000000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x87dd83051e534a07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc37, 0x0, 0x0, 0x0, 0x214}, [@map={0x18, 0x5, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x49, &(0x7f0000000140)=""/73, 0x41000, 0x6, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x3, 0x2, 0x94}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400af2339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) [ 2708.706237][ T7694] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 04:40:52 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0xfffffffffffffc3a}], 0x1}, 0x0) 04:40:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xffffffffa0008000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:52 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x20000000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:52 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) 04:40:52 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x28000000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:52 executing program 0 (fault-call:5 fault-nth:18): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') 04:40:52 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x2c010000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 04:40:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0xffffffffa0018000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e505fb0d61e18fbd2fe6a5dd80009d00010801000000000300f87f00006400", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 04:40:52 executing program 4: socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000080)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x80, &(0x7f0000000000), 0xa9, &(0x7f0000000100)=ANY=[], 0x149, 0x2000c000}, 0x20000011) 04:40:52 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0200b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x5, 0x0) 04:40:53 executing program 2: r0 = socket$kcm(0x2b, 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x3c000000, 0x201a7fa6, 0x7, 0x1, 0x18}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 2709.280292][ T7738] device nr0 entered promiscuous mode [ 2709.298147][ T7738] FAULT_INJECTION: forcing a failure. [ 2709.298147][ T7738] name failslab, interval 1, probability 0, space 0, times 0 [ 2709.312575][ T7738] CPU: 0 PID: 7738 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2709.320384][ T7738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2709.330428][ T7738] Call Trace: [ 2709.333707][ T7738] dump_stack+0x172/0x1f0 [ 2709.338022][ T7738] should_fail.cold+0xa/0x15 [ 2709.342602][ T7738] ? fault_create_debugfs_attr+0x180/0x180 [ 2709.348405][ T7738] ? page_to_nid.part.0+0x20/0x20 [ 2709.353411][ T7738] ? ___might_sleep+0x163/0x280 [ 2709.358259][ T7738] __should_failslab+0x121/0x190 [ 2709.363179][ T7738] should_failslab+0x9/0x14 [ 2709.367662][ T7738] kmem_cache_alloc_trace+0x2d3/0x790 [ 2709.373015][ T7738] ? addrconf_add_linklocal+0x202/0x3c0 [ 2709.378546][ T7738] fib6_info_alloc+0xb6/0x1b0 [ 2709.383209][ T7738] ip6_route_info_create+0x2fe/0x1530 [ 2709.388559][ T7738] ? addrconf_f6i_alloc+0xb9/0x4a0 [ 2709.393652][ T7738] addrconf_f6i_alloc+0x307/0x4a0 [ 2709.398659][ T7738] ? ipv6_route_ioctl+0x350/0x350 [ 2709.403673][ T7738] ? kasan_kmalloc+0x9/0x10 [ 2709.408256][ T7738] ? kmem_cache_alloc_trace+0x346/0x790 [ 2709.413783][ T7738] ? blocking_notifier_call_chain+0x5e/0xb0 [ 2709.419661][ T7738] ipv6_add_addr+0x3aa/0x1c80 [ 2709.424322][ T7738] ? rwlock_bug.part.0+0x90/0x90 [ 2709.429243][ T7738] ? _crng_backtrack_protect+0x78/0x140 [ 2709.434767][ T7738] ? trace_hardirqs_on+0x67/0x240 [ 2709.439784][ T7738] ? __kasan_check_read+0x11/0x20 [ 2709.444801][ T7738] ? inet6_netconf_get_devconf+0xb30/0xb30 [ 2709.450604][ T7738] ? lock_downgrade+0x920/0x920 [ 2709.455442][ T7738] addrconf_add_linklocal+0x202/0x3c0 [ 2709.460796][ T7738] ? addrconf_add_linklocal+0x202/0x3c0 [ 2709.466328][ T7738] ? addrconf_dad_start+0xb0/0xb0 [ 2709.471345][ T7738] addrconf_addr_gen+0x336/0x3a0 [ 2709.476264][ T7738] ? addrconf_add_linklocal+0x3c0/0x3c0 [ 2709.481797][ T7738] addrconf_dev_config+0x1ea/0x2c0 [ 2709.486890][ T7738] ? addrconf_dev_config+0x1ea/0x2c0 [ 2709.492155][ T7738] addrconf_notify+0x3bf/0x23b0 [ 2709.496989][ T7738] ? lock_downgrade+0x920/0x920 [ 2709.501827][ T7738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2709.508054][ T7738] ? inet6_ifinfo_notify+0x150/0x150 [ 2709.513321][ T7738] ? tls_device_gc_task+0x550/0x550 [ 2709.518502][ T7738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2709.524722][ T7738] ? ip6mr_device_event+0x1ad/0x220 [ 2709.529915][ T7738] notifier_call_chain+0xc2/0x230 [ 2709.535013][ T7738] ? notifier_call_chain+0xc2/0x230 [ 2709.540214][ T7738] raw_notifier_call_chain+0x2e/0x40 [ 2709.545483][ T7738] call_netdevice_notifiers_info+0x3f/0x90 [ 2709.551270][ T7738] __dev_notify_flags+0x121/0x2c0 [ 2709.556273][ T7738] ? dev_set_rx_mode+0x30/0x40 [ 2709.561015][ T7738] ? dev_change_name+0xa70/0xa70 [ 2709.565934][ T7738] ? dev_set_allmulti+0x30/0x30 [ 2709.570765][ T7738] ? security_file_ioctl+0x77/0xc0 [ 2709.575870][ T7738] ? mutex_lock_io_nested+0x1260/0x1260 [ 2709.581396][ T7738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2709.587618][ T7738] dev_change_flags+0x10d/0x170 [ 2709.592450][ T7738] dev_ifsioc+0x2aa/0xa00 [ 2709.596772][ T7738] ? full_name_hash+0xc0/0x100 [ 2709.601514][ T7738] ? register_gifconf+0x70/0x70 [ 2709.606359][ T7738] dev_ioctl+0x1b2/0xc68 [ 2709.610588][ T7738] sock_do_ioctl+0x1b7/0x2f0 [ 2709.615172][ T7738] ? compat_ifr_data_ioctl+0x160/0x160 [ 2709.620648][ T7738] ? trace_hardirqs_on+0x67/0x240 [ 2709.625656][ T7738] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2709.631880][ T7738] ? tomoyo_path_number_perm+0x263/0x520 [ 2709.637493][ T7738] sock_ioctl+0x3ed/0x780 [ 2709.641805][ T7738] ? dlci_ioctl_set+0x40/0x40 [ 2709.646464][ T7738] ? __kasan_check_read+0x11/0x20 [ 2709.651473][ T7738] ? dlci_ioctl_set+0x40/0x40 [ 2709.656129][ T7738] do_vfs_ioctl+0xdb6/0x13e0 [ 2709.660711][ T7738] ? ioctl_preallocate+0x210/0x210 [ 2709.665800][ T7738] ? __fget+0x384/0x560 [ 2709.669937][ T7738] ? ksys_dup3+0x3e0/0x3e0 [ 2709.674336][ T7738] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2709.680554][ T7738] ? fput_many+0x12c/0x1a0 [ 2709.684956][ T7738] ? tomoyo_file_ioctl+0x23/0x30 [ 2709.689873][ T7738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2709.696091][ T7738] ? security_file_ioctl+0x8d/0xc0 [ 2709.701183][ T7738] ksys_ioctl+0xab/0xd0 [ 2709.705329][ T7738] __x64_sys_ioctl+0x73/0xb0 [ 2709.709903][ T7738] do_syscall_64+0xfd/0x6a0 [ 2709.714389][ T7738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2709.720261][ T7738] RIP: 0033:0x4598e9 [ 2709.724144][ T7738] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2709.743728][ T7738] RSP: 002b:00007f3dbc201c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2709.752116][ T7738] RAX: ffffffffffffffda RBX: 00007f3dbc201c90 RCX: 00000000004598e9 [ 2709.760073][ T7738] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 2709.768033][ T7738] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2709.775983][ T7738] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc2026d4 [ 2709.783938][ T7738] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 [ 2709.798218][ T7738] kasan: CONFIG_KASAN_INLINE enabled [ 2709.803682][ T7738] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 2709.812243][ T7738] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 2709.819195][ T7738] CPU: 1 PID: 7738 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 2709.826993][ T7738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2709.837179][ T7738] RIP: 0010:addrconf_f6i_alloc+0x32d/0x4a0 [ 2709.842978][ T7738] Code: 59 bc ff ff 48 85 c0 49 89 c4 74 3d e8 dc 36 32 fb 49 8d bc 24 86 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 1f 01 00 00 [ 2709.862561][ T7738] RSP: 0018:ffff888032b472a0 EFLAGS: 00010206 [ 2709.868608][ T7738] RAX: dffffc0000000000 RBX: 1ffff11006568e56 RCX: ffffc90005f4d000 [ 2709.876559][ T7738] RDX: 000000000000000f RSI: ffffffff86403e74 RDI: 000000000000007a [ 2709.884510][ T7738] RBP: ffff888032b47420 R08: ffff88808c5084c0 R09: fffffbfff11cae6f [ 2709.892463][ T7738] R10: fffffbfff11cae6e R11: ffffffff88e57373 R12: fffffffffffffff4 [ 2709.900412][ T7738] R13: ffff88806ce28900 R14: ffff888032b47680 R15: 0000000000000000 [ 2709.908365][ T7738] FS: 00007f3dbc202700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2709.917273][ T7738] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2709.923847][ T7738] CR2: 0000001b2e422000 CR3: 000000006b410000 CR4: 00000000001406e0 [ 2709.931816][ T7738] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2709.939777][ T7738] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2709.947726][ T7738] Call Trace: [ 2709.951005][ T7738] ? ipv6_route_ioctl+0x350/0x350 [ 2709.956017][ T7738] ? kasan_kmalloc+0x9/0x10 [ 2709.964669][ T7738] ? kmem_cache_alloc_trace+0x346/0x790 [ 2709.970206][ T7738] ? blocking_notifier_call_chain+0x5e/0xb0 [ 2709.976081][ T7738] ipv6_add_addr+0x3aa/0x1c80 [ 2709.980745][ T7738] ? rwlock_bug.part.0+0x90/0x90 [ 2709.985662][ T7738] ? _crng_backtrack_protect+0x78/0x140 [ 2709.991184][ T7738] ? trace_hardirqs_on+0x67/0x240 [ 2709.996184][ T7738] ? __kasan_check_read+0x11/0x20 [ 2710.001199][ T7738] ? inet6_netconf_get_devconf+0xb30/0xb30 [ 2710.007008][ T7738] ? lock_downgrade+0x920/0x920 [ 2710.011841][ T7738] addrconf_add_linklocal+0x202/0x3c0 [ 2710.017206][ T7738] ? addrconf_add_linklocal+0x202/0x3c0 [ 2710.022738][ T7738] ? addrconf_dad_start+0xb0/0xb0 [ 2710.027750][ T7738] addrconf_addr_gen+0x336/0x3a0 [ 2710.032668][ T7738] ? addrconf_add_linklocal+0x3c0/0x3c0 [ 2710.038203][ T7738] addrconf_dev_config+0x1ea/0x2c0 [ 2710.043297][ T7738] ? addrconf_dev_config+0x1ea/0x2c0 [ 2710.048561][ T7738] addrconf_notify+0x3bf/0x23b0 [ 2710.053393][ T7738] ? lock_downgrade+0x920/0x920 [ 2710.058244][ T7738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2710.064468][ T7738] ? inet6_ifinfo_notify+0x150/0x150 [ 2710.069729][ T7738] ? tls_device_gc_task+0x550/0x550 [ 2710.074917][ T7738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2710.081138][ T7738] ? ip6mr_device_event+0x1ad/0x220 [ 2710.086317][ T7738] notifier_call_chain+0xc2/0x230 [ 2710.091317][ T7738] ? notifier_call_chain+0xc2/0x230 [ 2710.096494][ T7738] raw_notifier_call_chain+0x2e/0x40 [ 2710.101767][ T7738] call_netdevice_notifiers_info+0x3f/0x90 [ 2710.107564][ T7738] __dev_notify_flags+0x121/0x2c0 [ 2710.112583][ T7738] ? dev_set_rx_mode+0x30/0x40 [ 2710.117328][ T7738] ? dev_change_name+0xa70/0xa70 [ 2710.122244][ T7738] ? dev_set_allmulti+0x30/0x30 [ 2710.127101][ T7738] ? security_file_ioctl+0x77/0xc0 [ 2710.132203][ T7738] ? mutex_lock_io_nested+0x1260/0x1260 [ 2710.137738][ T7738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2710.143957][ T7738] dev_change_flags+0x10d/0x170 [ 2710.148785][ T7738] dev_ifsioc+0x2aa/0xa00 [ 2710.153092][ T7738] ? full_name_hash+0xc0/0x100 [ 2710.157837][ T7738] ? register_gifconf+0x70/0x70 [ 2710.162668][ T7738] dev_ioctl+0x1b2/0xc68 [ 2710.166893][ T7738] sock_do_ioctl+0x1b7/0x2f0 [ 2710.171468][ T7738] ? compat_ifr_data_ioctl+0x160/0x160 [ 2710.176904][ T7738] ? trace_hardirqs_on+0x67/0x240 [ 2710.181908][ T7738] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2710.188141][ T7738] ? tomoyo_path_number_perm+0x263/0x520 [ 2710.193753][ T7738] sock_ioctl+0x3ed/0x780 [ 2710.198060][ T7738] ? dlci_ioctl_set+0x40/0x40 [ 2710.202722][ T7738] ? __kasan_check_read+0x11/0x20 [ 2710.207729][ T7738] ? dlci_ioctl_set+0x40/0x40 [ 2710.212384][ T7738] do_vfs_ioctl+0xdb6/0x13e0 [ 2710.216954][ T7738] ? ioctl_preallocate+0x210/0x210 [ 2710.222056][ T7738] ? __fget+0x384/0x560 [ 2710.226201][ T7738] ? ksys_dup3+0x3e0/0x3e0 [ 2710.230602][ T7738] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2710.236820][ T7738] ? fput_many+0x12c/0x1a0 [ 2710.241267][ T7738] ? tomoyo_file_ioctl+0x23/0x30 [ 2710.246205][ T7738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2710.252430][ T7738] ? security_file_ioctl+0x8d/0xc0 [ 2710.257532][ T7738] ksys_ioctl+0xab/0xd0 [ 2710.261720][ T7738] __x64_sys_ioctl+0x73/0xb0 [ 2710.266292][ T7738] do_syscall_64+0xfd/0x6a0 [ 2710.270777][ T7738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2710.276644][ T7738] RIP: 0033:0x4598e9 [ 2710.280520][ T7738] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2710.300107][ T7738] RSP: 002b:00007f3dbc201c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2710.308499][ T7738] RAX: ffffffffffffffda RBX: 00007f3dbc201c90 RCX: 00000000004598e9 [ 2710.316449][ T7738] RDX: 00000000200018c0 RSI: 0000000000008914 RDI: 0000000000000005 [ 2710.324398][ T7738] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2710.332352][ T7738] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbc2026d4 [ 2710.340318][ T7738] R13: 00000000004cd4d8 R14: 00000000004d6b10 R15: 0000000000000006 [ 2710.348283][ T7738] Modules linked in: [ 2710.356212][ T7738] ---[ end trace dae36b64eec0558d ]--- [ 2710.362219][ T7738] RIP: 0010:addrconf_f6i_alloc+0x32d/0x4a0 [ 2710.368105][ T7738] Code: 59 bc ff ff 48 85 c0 49 89 c4 74 3d e8 dc 36 32 fb 49 8d bc 24 86 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 1f 01 00 00 [ 2710.387979][ T7738] RSP: 0018:ffff888032b472a0 EFLAGS: 00010206 [ 2710.394583][ T7738] RAX: dffffc0000000000 RBX: 1ffff11006568e56 RCX: ffffc90005f4d000 [ 2710.403020][ T7738] RDX: 000000000000000f RSI: ffffffff86403e74 RDI: 000000000000007a [ 2710.411088][ T7738] RBP: ffff888032b47420 R08: ffff88808c5084c0 R09: fffffbfff11cae6f [ 2710.419182][ T7738] R10: fffffbfff11cae6e R11: ffffffff88e57373 R12: fffffffffffffff4 [ 2710.427240][ T7738] R13: ffff88806ce28900 R14: ffff888032b47680 R15: 0000000000000000 [ 2710.435277][ T7738] FS: 00007f3dbc202700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2710.444278][ T7738] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2710.450903][ T7738] CR2: 0000001b33b2a000 CR3: 000000006b410000 CR4: 00000000001406e0 [ 2710.458956][ T7738] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2710.466919][ T7738] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2710.474945][ T7738] Kernel panic - not syncing: Fatal exception [ 2710.482252][ T7738] Kernel Offset: disabled [ 2710.486591][ T7738] Rebooting in 86400 seconds..