) mkdir(&(0x7f0000000300)='./file0\x00', 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x60000000, 'memory'}]}, 0xe378) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000001180)={0x0, 0x0, 0x0}, 0x10) 00:50:45 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x60000000, 'memory'}]}, 0xe378) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000001180)={0x0, 0x0, 0x0}, 0x10) 00:50:45 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x7, &(0x7f00000000c0), 0x4) sendmsg$inet(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000040)='M', 0x1}], 0x1}, 0x0) 00:50:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xa01, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f370886dd60df006100261100ff9e060000cfab170e16b7833e214658904b6b16c7dcf02d170080259c4c2098"], 0x36) 00:50:45 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x60000000, 'memory'}]}, 0xe378) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000001180)={0x0, 0x0, 0x0}, 0x10) 00:50:45 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x7, &(0x7f00000000c0), 0x4) sendmsg$inet(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000040)='M', 0x1}], 0x1}, 0x0) 00:50:45 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x60000000, 'memory'}]}, 0xe378) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000001180)={0x0, 0x0, 0x0}, 0x10) 00:50:45 executing program 3: bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff}, 0xc) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000300)='},bdev]GPLmd5sumeth0-\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xffffffffffffffe0, 0x8, 0x40, 0x0, 0x0, 0x0, 0x200, 0x4, 0x10001, 0x0, 0x7fffffff, 0x6, 0x30, 0x7fff, 0x7, 0x8d3f, 0x4, 0x8001, 0xd7, 0x80000000, 0x80000000, 0x7, 0x7, 0x40, 0x8, 0x100000000, 0x0, 0x4800000000, 0x6, 0x5, 0x8001, 0xac, 0x8, 0x2, 0x2, 0x7, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x4000, 0x1ff, 0xa0f2, 0x8, 0x0, 0x52, 0x7e93}, r1, 0xa, r2, 0x2) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2000) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000007240)={&(0x7f0000007040)=ANY=[@ANYBLOB="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"], 0x0, 0x14a}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007300)={0x0, 0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x5bc3157d, 0x0, 0x0, 0x0, 0x7, [], 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f00000072c0)={0x3}, 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501886400de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 00:50:46 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x60000000, 'memory'}]}, 0xe378) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000001180)={0x0, 0x0, 0x0}, 0x10) 00:50:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000440)="addf", &(0x7f0000000540)=""/236}, 0x18) [ 405.005029][T20436] device nr0 entered promiscuous mode 00:50:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000440)="addf", &(0x7f0000000540)=""/236}, 0x18) 00:50:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x0, 0x0, 0xfffffffffffffffd, 0x544, 0x0, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x8, 0x6, 0x0, 0xcad, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7a, 0x4, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x4, 0xf4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x5, 0x3, 0x0, 0xa92, 0x1ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00), 0x91) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2f, 'cpu'}, {0x2d, 'io'}]}, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000002c0)='{nodev+em0ppp0trustedbdeveth0\x00') write$cgroup_subtree(r0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c680)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:50:46 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x7, &(0x7f00000000c0), 0x4) sendmsg$inet(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000040)='M', 0x1}], 0x1}, 0x0) 00:50:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000440)="addf", &(0x7f0000000540)=""/236}, 0x18) 00:50:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000440)="addf", &(0x7f0000000540)=""/236}, 0x18) [ 405.738851][ T26] audit: type=1804 audit(1567558246.823:119): pid=20467 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir159203183/syzkaller.jnXU3N/479/memory.events" dev="sda1" ino=16532 res=1 00:50:46 executing program 3: r0 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:50:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x0, 0xb, 0x807, 0x8, 0x0, r0}, 0x3c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x3, 0x0, 0x2, 0x0, 0x200bd8f091b98834}, 0xffffffffffffffbf) socket$kcm(0x29, 0x400005, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net//yz0\x0f', 0x1ff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) r3 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200)=r3, 0x12) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1eb) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x0, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) socketpair(0x0, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, 0x0) 00:50:46 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x7, &(0x7f00000000c0), 0x4) sendmsg$inet(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000040)='M', 0x1}], 0x1}, 0x0) 00:50:46 executing program 5: socket$kcm(0x2, 0x2, 0x73) r0 = socket$kcm(0x2, 0x2, 0x73) close(r0) 00:50:47 executing program 5: socket$kcm(0x2, 0x2, 0x73) r0 = socket$kcm(0x2, 0x2, 0x73) close(r0) 00:50:47 executing program 5: socket$kcm(0x2, 0x2, 0x73) r0 = socket$kcm(0x2, 0x2, 0x73) close(r0) [ 406.084011][ T26] audit: type=1804 audit(1567558247.163:120): pid=20465 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir159203183/syzkaller.jnXU3N/479/memory.events" dev="sda1" ino=16532 res=1 00:50:47 executing program 5: socket$kcm(0x2, 0x2, 0x73) r0 = socket$kcm(0x2, 0x2, 0x73) close(r0) [ 406.141240][ T26] audit: type=1804 audit(1567558247.193:121): pid=20453 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir159203183/syzkaller.jnXU3N/479/memory.events" dev="sda1" ino=16532 res=1 00:50:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x0, 0x0, 0xfffffffffffffffd, 0x544, 0x0, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x8, 0x6, 0x0, 0xcad, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7a, 0x4, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x4, 0xf4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x5, 0x3, 0x0, 0xa92, 0x1ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00), 0x91) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2f, 'cpu'}, {0x2d, 'io'}]}, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000002c0)='{nodev+em0ppp0trustedbdeveth0\x00') write$cgroup_subtree(r0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c680)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:50:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x0, 0x0, 0xfffffffffffffffd, 0x544, 0x0, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x8, 0x6, 0x0, 0xcad, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7a, 0x4, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x4, 0xf4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x5, 0x3, 0x0, 0xa92, 0x1ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00), 0x91) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2f, 'cpu'}, {0x2d, 'io'}]}, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000002c0)='{nodev+em0ppp0trustedbdeveth0\x00') write$cgroup_subtree(r0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c680)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:50:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x0, 0x0, 0xfffffffffffffffd, 0x544, 0x0, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x8, 0x6, 0x0, 0xcad, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7a, 0x4, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x4, 0xf4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x5, 0x3, 0x0, 0xa92, 0x1ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00), 0x91) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2f, 'cpu'}, {0x2d, 'io'}]}, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000002c0)='{nodev+em0ppp0trustedbdeveth0\x00') write$cgroup_subtree(r0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c680)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:50:47 executing program 1: socket$kcm(0x2, 0x2, 0x73) r0 = socket$kcm(0x2, 0x2, 0x73) close(r0) [ 406.848533][ T26] audit: type=1804 audit(1567558247.933:122): pid=20505 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir159203183/syzkaller.jnXU3N/480/memory.events" dev="sda1" ino=16547 res=1 00:50:48 executing program 1: socket$kcm(0x2, 0x2, 0x73) r0 = socket$kcm(0x2, 0x2, 0x73) close(r0) [ 406.970221][ T26] audit: type=1804 audit(1567558248.053:123): pid=20504 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir551644862/syzkaller.eDmOtn/59/memory.events" dev="sda1" ino=16549 res=1 [ 407.082814][ T26] audit: type=1804 audit(1567558248.093:124): pid=20506 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir543445425/syzkaller.Xb49zc/490/memory.events" dev="sda1" ino=16536 res=1 00:50:48 executing program 3: r0 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:50:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x0, 0xb, 0x807, 0x8, 0x0, r0}, 0x3c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x3, 0x0, 0x2, 0x0, 0x200bd8f091b98834}, 0xffffffffffffffbf) socket$kcm(0x29, 0x400005, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net//yz0\x0f', 0x1ff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) r3 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200)=r3, 0x12) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1eb) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x0, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) socketpair(0x0, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, 0x0) 00:50:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x0, 0x0, 0xfffffffffffffffd, 0x544, 0x0, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x8, 0x6, 0x0, 0xcad, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7a, 0x4, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x4, 0xf4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x5, 0x3, 0x0, 0xa92, 0x1ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00), 0x91) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2f, 'cpu'}, {0x2d, 'io'}]}, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000002c0)='{nodev+em0ppp0trustedbdeveth0\x00') write$cgroup_subtree(r0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c680)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:50:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x0, 0x0, 0xfffffffffffffffd, 0x544, 0x0, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x8, 0x6, 0x0, 0xcad, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7a, 0x4, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x4, 0xf4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x5, 0x3, 0x0, 0xa92, 0x1ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00), 0x91) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2f, 'cpu'}, {0x2d, 'io'}]}, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000002c0)='{nodev+em0ppp0trustedbdeveth0\x00') write$cgroup_subtree(r0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c680)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:50:48 executing program 1: socket$kcm(0x2, 0x2, 0x73) r0 = socket$kcm(0x2, 0x2, 0x73) close(r0) 00:50:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x0, 0x0, 0xfffffffffffffffd, 0x544, 0x0, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x8, 0x6, 0x0, 0xcad, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7a, 0x4, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x4, 0xf4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x5, 0x3, 0x0, 0xa92, 0x1ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00), 0x91) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2f, 'cpu'}, {0x2d, 'io'}]}, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000002c0)='{nodev+em0ppp0trustedbdeveth0\x00') write$cgroup_subtree(r0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c680)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:50:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 00:50:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 00:50:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) [ 407.740423][ T26] audit: type=1804 audit(1567558248.823:125): pid=20537 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir551644862/syzkaller.eDmOtn/60/memory.events" dev="sda1" ino=16539 res=1 [ 407.814655][ T26] audit: type=1804 audit(1567558248.873:126): pid=20548 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir543445425/syzkaller.Xb49zc/491/memory.events" dev="sda1" ino=16538 res=1 00:50:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x0, 0x0, 0xfffffffffffffffd, 0x544, 0x0, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x8, 0x6, 0x0, 0xcad, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7a, 0x4, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x4, 0xf4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x5, 0x3, 0x0, 0xa92, 0x1ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00), 0x91) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2f, 'cpu'}, {0x2d, 'io'}]}, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000002c0)='{nodev+em0ppp0trustedbdeveth0\x00') write$cgroup_subtree(r0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c680)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 407.885434][ T26] audit: type=1804 audit(1567558248.893:127): pid=20546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir159203183/syzkaller.jnXU3N/481/memory.events" dev="sda1" ino=16547 res=1 00:50:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 00:50:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x0, 0x0, 0xfffffffffffffffd, 0x544, 0x0, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x8, 0x6, 0x0, 0xcad, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7a, 0x4, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x4, 0xf4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x5, 0x3, 0x0, 0xa92, 0x1ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00), 0x91) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2f, 'cpu'}, {0x2d, 'io'}]}, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000002c0)='{nodev+em0ppp0trustedbdeveth0\x00') write$cgroup_subtree(r0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c680)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:50:49 executing program 3: r0 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:50:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x0, 0xb, 0x807, 0x8, 0x0, r0}, 0x3c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x3, 0x0, 0x2, 0x0, 0x200bd8f091b98834}, 0xffffffffffffffbf) socket$kcm(0x29, 0x400005, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net//yz0\x0f', 0x1ff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) r3 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200)=r3, 0x12) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1eb) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x0, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) socketpair(0x0, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, 0x0) 00:50:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)=r0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='io '], 0x9) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="8ac6aaf2ace45825aa467f2a2d01"], 0xe) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 00:50:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x0, 0x0, 0xfffffffffffffffd, 0x544, 0x0, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x8, 0x6, 0x0, 0xcad, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7a, 0x4, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x4, 0xf4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x5, 0x3, 0x0, 0xa92, 0x1ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00), 0x91) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2f, 'cpu'}, {0x2d, 'io'}]}, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000002c0)='{nodev+em0ppp0trustedbdeveth0\x00') write$cgroup_subtree(r0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c680)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 408.519485][ T26] audit: type=1804 audit(1567558249.603:128): pid=20577 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir412876014/syzkaller.afGnzw/489/memory.events" dev="sda1" ino=16547 res=1 00:50:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)=r0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='io '], 0x9) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="8ac6aaf2ace45825aa467f2a2d01"], 0xe) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 00:50:49 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x7c}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0x44e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe64}, 0x48) 00:50:49 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b187000000", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) recvmsg(r0, &(0x7f000000e980)={0x0, 0x0, &(0x7f000000e940)=[{0x0}], 0x1}, 0x40010000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000001f80)) 00:50:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x7c}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0x44e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe64}, 0x48) 00:50:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)=r0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='io '], 0x9) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="8ac6aaf2ace45825aa467f2a2d01"], 0xe) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 00:50:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000ff29239c6fff79e9d3f8f5e5c19d0e90577f15d989ad2a8c528d4f67f09e3e533410c7d6e1950c7017828a122a7f36ce44811efdf6f1fc09d6baf38690320314ff7e473466a9010031d7e5cbbd6e779309c561c6b9ba095d4e5c55db9588359f05e5234e4af4"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 00:50:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x7c}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0x44e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe64}, 0x48) 00:50:50 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b187000000", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) recvmsg(r0, &(0x7f000000e980)={0x0, 0x0, &(0x7f000000e940)=[{0x0}], 0x1}, 0x40010000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000001f80)) 00:50:50 executing program 3: r0 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:50:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x0, 0xb, 0x807, 0x8, 0x0, r0}, 0x3c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x3, 0x0, 0x2, 0x0, 0x200bd8f091b98834}, 0xffffffffffffffbf) socket$kcm(0x29, 0x400005, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net//yz0\x0f', 0x1ff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) r3 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200)=r3, 0x12) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="c5705feef2ad087ad85f18694c1017ddb0db9af9d8740c037866e4e11a120000709c035e2dfc5fe3f3069c989645c2bd1a41987b2a5a17c40d4030da09b9f811c2827a54641ae27163e8a36748c9c4d555f99bea156a1bfd05f135cdfd3fef53eb7be699737c318b9116b7caaaeda1a2728085d8c32de5e106085e0803deaaaa6d65be78889b85a18f9b40d3a4a3b9a401a6a4f3904bd750f512f1913fcf577506000000000000009812319bad77d311aa83008cea3ecd6353806420783b786dc24c956c3c9c5f053be48c1ee9c438c17dfdcef30848100d1d04b70c913c610e2a5047bea1d80f97de346de3ffdc41eea8cdf893ac1a3d97e46c328cf36f6d69a9fe4f3c0ad4ab4872d0aba441009dd96c36888138d916d80d83b344fecf8dadf652f3df18bfdd7564dfc1f96294421e8b20ad6efa5e3ff8bacf1f3c2fffda4ddd402e18fe5b4b08c00508cf39cda3ee71c0bf238de5831d3f7bf45cdbddc4cf66530b8850a2f63276aa3b99410900097dc94b141ebb6de7c31ea72f8b21950e6b34834b45bdc8d2a42181dd720f6449d98ce0e5f8ac757800f4e0c0dc1f81421263ce231c9e9bd65125fff3f5e65e429eb5c0ee14dbeca31dcd9e615b4a7bd0f2452f5f1ce844d2dd947f8a8be26a15451cf395127ea0ddc982997c4231b74d612684a363a7fca88fc35f9bfac1687d6c7abc4106a75136abd2cd3f07335d032a5c79804ec6f5430742090eff99baaeae31ff8d3887947f53d835d1048547b2c972f5ede6d4425563856fdf57d834dffd0b31659748c891"], 0x1eb) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x0, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) socketpair(0x0, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, 0x0) 00:50:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)=r0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='io '], 0x9) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="8ac6aaf2ace45825aa467f2a2d01"], 0xe) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 00:50:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x7c}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0x44e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe64}, 0x48) 00:50:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000ff29239c6fff79e9d3f8f5e5c19d0e90577f15d989ad2a8c528d4f67f09e3e533410c7d6e1950c7017828a122a7f36ce44811efdf6f1fc09d6baf38690320314ff7e473466a9010031d7e5cbbd6e779309c561c6b9ba095d4e5c55db9588359f05e5234e4af4"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 00:50:50 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b187000000", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) recvmsg(r0, &(0x7f000000e980)={0x0, 0x0, &(0x7f000000e940)=[{0x0}], 0x1}, 0x40010000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000001f80)) 00:50:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000ff29239c6fff79e9d3f8f5e5c19d0e90577f15d989ad2a8c528d4f67f09e3e533410c7d6e1950c7017828a122a7f36ce44811efdf6f1fc09d6baf38690320314ff7e473466a9010031d7e5cbbd6e779309c561c6b9ba095d4e5c55db9588359f05e5234e4af4"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 00:50:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000ff29239c6fff79e9d3f8f5e5c19d0e90577f15d989ad2a8c528d4f67f09e3e533410c7d6e1950c7017828a122a7f36ce44811efdf6f1fc09d6baf38690320314ff7e473466a9010031d7e5cbbd6e779309c561c6b9ba095d4e5c55db9588359f05e5234e4af4"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 00:50:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000ff29239c6fff79e9d3f8f5e5c19d0e90577f15d989ad2a8c528d4f67f09e3e533410c7d6e1950c7017828a122a7f36ce44811efdf6f1fc09d6baf38690320314ff7e473466a9010031d7e5cbbd6e779309c561c6b9ba095d4e5c55db9588359f05e5234e4af4"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 00:50:50 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b187000000", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) recvmsg(r0, &(0x7f000000e980)={0x0, 0x0, &(0x7f000000e940)=[{0x0}], 0x1}, 0x40010000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000001f80)) 00:50:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000ff29239c6fff79e9d3f8f5e5c19d0e90577f15d989ad2a8c528d4f67f09e3e533410c7d6e1950c7017828a122a7f36ce44811efdf6f1fc09d6baf38690320314ff7e473466a9010031d7e5cbbd6e779309c561c6b9ba095d4e5c55db9588359f05e5234e4af4"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 00:50:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000ff29239c6fff79e9d3f8f5e5c19d0e90577f15d989ad2a8c528d4f67f09e3e533410c7d6e1950c7017828a122a7f36ce44811efdf6f1fc09d6baf38690320314ff7e473466a9010031d7e5cbbd6e779309c561c6b9ba095d4e5c55db9588359f05e5234e4af4"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 00:50:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000ff29239c6fff79e9d3f8f5e5c19d0e90577f15d989ad2a8c528d4f67f09e3e533410c7d6e1950c7017828a122a7f36ce44811efdf6f1fc09d6baf38690320314ff7e473466a9010031d7e5cbbd6e779309c561c6b9ba095d4e5c55db9588359f05e5234e4af4"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 00:50:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x2, 0x4, 0x417, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 00:50:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000ff29239c6fff79e9d3f8f5e5c19d0e90577f15d989ad2a8c528d4f67f09e3e533410c7d6e1950c7017828a122a7f36ce44811efdf6f1fc09d6baf38690320314ff7e473466a9010031d7e5cbbd6e779309c561c6b9ba095d4e5c55db9588359f05e5234e4af4"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 00:50:51 executing program 0: socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b187000000", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) recvmsg(r0, &(0x7f000000e980)={0x0, 0x0, &(0x7f000000e940)=[{0x0}], 0x1}, 0x40010000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000001f80)) 00:50:51 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b187000000", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) recvmsg(r0, &(0x7f000000e980)={0x0, 0x0, &(0x7f000000e940)=[{0x0}], 0x1}, 0x40010000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000001f80)) 00:50:51 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b187000000", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) recvmsg(r0, &(0x7f000000e980)={0x0, 0x0, &(0x7f000000e940)=[{0x0}], 0x1}, 0x40010000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000001f80)) 00:50:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x179, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:50:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x179, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:50:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000ff29239c6fff79e9d3f8f5e5c19d0e90577f15d989ad2a8c528d4f67f09e3e533410c7d6e1950c7017828a122a7f36ce44811efdf6f1fc09d6baf38690320314ff7e473466a9010031d7e5cbbd6e779309c561c6b9ba095d4e5c55db9588359f05e5234e4af4"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 00:50:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x2, 0x4, 0x417, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 00:50:52 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b187000000", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) recvmsg(r0, &(0x7f000000e980)={0x0, 0x0, &(0x7f000000e940)=[{0x0}], 0x1}, 0x40010000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000001f80)) 00:50:52 executing program 0: socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b187000000", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) recvmsg(r0, &(0x7f000000e980)={0x0, 0x0, &(0x7f000000e940)=[{0x0}], 0x1}, 0x40010000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000001f80)) 00:50:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x179, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:50:52 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b187000000", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) recvmsg(r0, &(0x7f000000e980)={0x0, 0x0, &(0x7f000000e940)=[{0x0}], 0x1}, 0x40010000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000001f80)) 00:50:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x179, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:50:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x2, 0x4, 0x417, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 00:50:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x2, 0x4, 0x417, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 00:50:52 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b187000000", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) recvmsg(r0, &(0x7f000000e980)={0x0, 0x0, &(0x7f000000e940)=[{0x0}], 0x1}, 0x40010000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000001f80)) 00:50:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e00000022008151c01980ecdb4c453a010065160b00010010000000020000140e0002000300cd6ddc2976d153b4", 0x2e}], 0x1}, 0x0) 00:50:52 executing program 0: socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b187000000", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) recvmsg(r0, &(0x7f000000e980)={0x0, 0x0, &(0x7f000000e940)=[{0x0}], 0x1}, 0x40010000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000001f80)) 00:50:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x2, 0x4, 0x417, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) [ 411.452266][T20719] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 00:50:52 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b187000000", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) recvmsg(r0, &(0x7f000000e980)={0x0, 0x0, &(0x7f000000e940)=[{0x0}], 0x1}, 0x40010000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000001f80)) 00:50:52 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001, 0x1}, 0x3c) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000100), &(0x7f00000000c0)}, 0x20) 00:50:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e00000022008151c01980ecdb4c453a010065160b00010010000000020000140e0002000300cd6ddc2976d153b4", 0x2e}], 0x1}, 0x0) 00:50:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x2, 0x4, 0x417, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 00:50:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x2, 0x4, 0x417, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 00:50:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac1414e0e9", 0x0, 0x100}, 0x28) [ 411.831335][T20740] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 00:50:53 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net//..\x00', 0x430002, 0x0) 00:50:53 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='.\xdemec\xa3\\/cgr\t\x00\x00\x00net//yz\b\x00\r\xcdq\x8f\x8d\xfeH.\x857\x87U\x8a\x06@k.F\x13\x94\xcf\x9f\x01K\xc6\x80\xbay\xc1V\xe8\xe3Z\x90\xdb\xfc\r\xa0\xec\x143\xee\xfe\xe5\x1e\xd3\xf2\xa1I\xf1&\xe2\xb1\xceK\xc7)\xa5\xc9\x9f\xc4\x88Fz\xbf\x95\x1b\x01~\xc3]\xf08\x8f\x1be\x1b\xa6\xdd\xa5<\xc5\xfc\x00\xcb\xd6\xb0\xa1\xf3e\xea!\"\xc3\xb5Y\x98\xa1\xe5u\x9b\x12\xa5\xb6\xf2!F\xee', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r3, 0x801054db, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x3, 0x70, 0x40000, 0x0, 0x3, 0xdd7, 0x0, 0x0, 0x20, 0x2, 0x6, 0x0, 0x0, 0x1, 0x8, 0x2, 0x0, 0x8000, 0x8000000000, 0x0, 0x0, 0x0, 0x9, 0x2e, 0x2, 0x2000000000000, 0x1, 0x5, 0xff, 0x7, 0x80000001, 0xfffffffffffffffb, 0x9, 0x3, 0x2, 0x1, 0x0, 0x0, 0x0, 0x100, 0x6, @perf_bp={&(0x7f0000000600), 0x2}, 0x42, 0xfffffffffffffffc, 0x10000, 0x5, 0x5, 0x3f, 0xd8}, r4, 0xe, 0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000240)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0xffff, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x5000000, 0x0, 0x7fff, 0x0, 0x0, 0x200, 0x0, 0x4, 0x2, 0xffffffff, 0x5, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x8, 0x3, 0x17, 0x4, 0x10, 0x800, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x100, 0x80000001, 0x5, 0x0, 0x4, 0x7, 0xad5, 0x7f, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0)}, 0x100, 0x4000000000000000, 0x8, 0xd, 0x0, 0x6, 0x7}) r6 = getpid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x10001) perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0x0, 0x7fff, 0x1f, 0x4500, 0x0, 0x0, 0x801, 0x4, 0x5, 0x10000, 0x5, 0x0, 0x80000001, 0x3ff, 0x5, 0x2, 0x80, 0x0, 0x1, 0x3, 0x7, 0x5, 0x7fff, 0x28, 0x0, 0x6, 0x8, 0x8000, 0x3, 0x0, 0x9, 0xffffffffffffff90, 0x0, 0x3, 0x800, 0x7, 0x0, 0x42, 0x6, @perf_config_ext={0x101, 0x6}, 0x800, 0xffff, 0x100000001, 0x0, 0x0, 0x4, 0xfffffffffffffabe}, r6, 0xa, r5, 0x8) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) 00:50:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e00000022008151c01980ecdb4c453a010065160b00010010000000020000140e0002000300cd6ddc2976d153b4", 0x2e}], 0x1}, 0x0) 00:50:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001, 0x1}, 0x3c) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000100), &(0x7f00000000c0)}, 0x20) 00:50:53 executing program 1: socket$kcm(0x10, 0x0, 0x4) socket$kcm(0x11, 0xa, 0x300) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001b00)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xe170) 00:50:53 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net//..\x00', 0x430002, 0x0) [ 412.100061][T20762] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 00:50:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac1414e0e9", 0x0, 0x100}, 0x28) 00:50:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e00000022008151c01980ecdb4c453a010065160b00010010000000020000140e0002000300cd6ddc2976d153b4", 0x2e}], 0x1}, 0x0) 00:50:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001, 0x1}, 0x3c) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000100), &(0x7f00000000c0)}, 0x20) [ 412.299817][T20766] device nr0 entered promiscuous mode [ 412.314381][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 412.320213][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:50:53 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net//..\x00', 0x430002, 0x0) [ 412.441975][T20787] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 00:50:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001, 0x1}, 0x3c) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000100), &(0x7f00000000c0)}, 0x20) 00:50:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac1414e0e9", 0x0, 0x100}, 0x28) 00:50:53 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) socket$kcm(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x200000000005, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xfff4) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x2ff8, 'memory'}]}, 0xfdef) [ 412.796508][T20759] device nr0 entered promiscuous mode 00:50:54 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='.\xdemec\xa3\\/cgr\t\x00\x00\x00net//yz\b\x00\r\xcdq\x8f\x8d\xfeH.\x857\x87U\x8a\x06@k.F\x13\x94\xcf\x9f\x01K\xc6\x80\xbay\xc1V\xe8\xe3Z\x90\xdb\xfc\r\xa0\xec\x143\xee\xfe\xe5\x1e\xd3\xf2\xa1I\xf1&\xe2\xb1\xceK\xc7)\xa5\xc9\x9f\xc4\x88Fz\xbf\x95\x1b\x01~\xc3]\xf08\x8f\x1be\x1b\xa6\xdd\xa5<\xc5\xfc\x00\xcb\xd6\xb0\xa1\xf3e\xea!\"\xc3\xb5Y\x98\xa1\xe5u\x9b\x12\xa5\xb6\xf2!F\xee', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r3, 0x801054db, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x3, 0x70, 0x40000, 0x0, 0x3, 0xdd7, 0x0, 0x0, 0x20, 0x2, 0x6, 0x0, 0x0, 0x1, 0x8, 0x2, 0x0, 0x8000, 0x8000000000, 0x0, 0x0, 0x0, 0x9, 0x2e, 0x2, 0x2000000000000, 0x1, 0x5, 0xff, 0x7, 0x80000001, 0xfffffffffffffffb, 0x9, 0x3, 0x2, 0x1, 0x0, 0x0, 0x0, 0x100, 0x6, @perf_bp={&(0x7f0000000600), 0x2}, 0x42, 0xfffffffffffffffc, 0x10000, 0x5, 0x5, 0x3f, 0xd8}, r4, 0xe, 0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000240)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0xffff, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x5000000, 0x0, 0x7fff, 0x0, 0x0, 0x200, 0x0, 0x4, 0x2, 0xffffffff, 0x5, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x8, 0x3, 0x17, 0x4, 0x10, 0x800, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x100, 0x80000001, 0x5, 0x0, 0x4, 0x7, 0xad5, 0x7f, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0)}, 0x100, 0x4000000000000000, 0x8, 0xd, 0x0, 0x6, 0x7}) r6 = getpid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x10001) perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0x0, 0x7fff, 0x1f, 0x4500, 0x0, 0x0, 0x801, 0x4, 0x5, 0x10000, 0x5, 0x0, 0x80000001, 0x3ff, 0x5, 0x2, 0x80, 0x0, 0x1, 0x3, 0x7, 0x5, 0x7fff, 0x28, 0x0, 0x6, 0x8, 0x8000, 0x3, 0x0, 0x9, 0xffffffffffffff90, 0x0, 0x3, 0x800, 0x7, 0x0, 0x42, 0x6, @perf_config_ext={0x101, 0x6}, 0x800, 0xffff, 0x100000001, 0x0, 0x0, 0x4, 0xfffffffffffffabe}, r6, 0xa, r5, 0x8) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) 00:50:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000023140)={0x4, 0x5, 0xff, 0x100, 0x0, r0, 0x4, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x33c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r1, 0x28}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000002680)=[{0x0}], 0x1, 0x0, 0x0, 0xa0028000}, 0x0) r2 = socket$kcm(0x11, 0x100000000003, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)=@sco={0x1f, {0x608}}, 0x80, 0x0}, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301003e00000000040000ac14140cebdf2ce2", 0x14}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) 00:50:54 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x88, 0x67, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x7fffef55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, 0x0) 00:50:54 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net//..\x00', 0x430002, 0x0) 00:50:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac1414e0e9", 0x0, 0x100}, 0x28) 00:50:54 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='.\xdemec\xa3\\/cgr\t\x00\x00\x00net//yz\b\x00\r\xcdq\x8f\x8d\xfeH.\x857\x87U\x8a\x06@k.F\x13\x94\xcf\x9f\x01K\xc6\x80\xbay\xc1V\xe8\xe3Z\x90\xdb\xfc\r\xa0\xec\x143\xee\xfe\xe5\x1e\xd3\xf2\xa1I\xf1&\xe2\xb1\xceK\xc7)\xa5\xc9\x9f\xc4\x88Fz\xbf\x95\x1b\x01~\xc3]\xf08\x8f\x1be\x1b\xa6\xdd\xa5<\xc5\xfc\x00\xcb\xd6\xb0\xa1\xf3e\xea!\"\xc3\xb5Y\x98\xa1\xe5u\x9b\x12\xa5\xb6\xf2!F\xee', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r3, 0x801054db, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x3, 0x70, 0x40000, 0x0, 0x3, 0xdd7, 0x0, 0x0, 0x20, 0x2, 0x6, 0x0, 0x0, 0x1, 0x8, 0x2, 0x0, 0x8000, 0x8000000000, 0x0, 0x0, 0x0, 0x9, 0x2e, 0x2, 0x2000000000000, 0x1, 0x5, 0xff, 0x7, 0x80000001, 0xfffffffffffffffb, 0x9, 0x3, 0x2, 0x1, 0x0, 0x0, 0x0, 0x100, 0x6, @perf_bp={&(0x7f0000000600), 0x2}, 0x42, 0xfffffffffffffffc, 0x10000, 0x5, 0x5, 0x3f, 0xd8}, r4, 0xe, 0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000240)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0xffff, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x5000000, 0x0, 0x7fff, 0x0, 0x0, 0x200, 0x0, 0x4, 0x2, 0xffffffff, 0x5, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x8, 0x3, 0x17, 0x4, 0x10, 0x800, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x100, 0x80000001, 0x5, 0x0, 0x4, 0x7, 0xad5, 0x7f, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0)}, 0x100, 0x4000000000000000, 0x8, 0xd, 0x0, 0x6, 0x7}) r6 = getpid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x10001) perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0x0, 0x7fff, 0x1f, 0x4500, 0x0, 0x0, 0x801, 0x4, 0x5, 0x10000, 0x5, 0x0, 0x80000001, 0x3ff, 0x5, 0x2, 0x80, 0x0, 0x1, 0x3, 0x7, 0x5, 0x7fff, 0x28, 0x0, 0x6, 0x8, 0x8000, 0x3, 0x0, 0x9, 0xffffffffffffff90, 0x0, 0x3, 0x800, 0x7, 0x0, 0x42, 0x6, @perf_config_ext={0x101, 0x6}, 0x800, 0xffff, 0x100000001, 0x0, 0x0, 0x4, 0xfffffffffffffabe}, r6, 0xa, r5, 0x8) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) 00:50:54 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) socket$kcm(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x200000000005, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xfff4) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x2ff8, 'memory'}]}, 0xfdef) 00:50:54 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) socket$kcm(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x200000000005, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xfff4) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x2ff8, 'memory'}]}, 0xfdef) 00:50:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000023140)={0x4, 0x5, 0xff, 0x100, 0x0, r0, 0x4, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x33c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r1, 0x28}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000002680)=[{0x0}], 0x1, 0x0, 0x0, 0xa0028000}, 0x0) r2 = socket$kcm(0x11, 0x100000000003, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)=@sco={0x1f, {0x608}}, 0x80, 0x0}, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301003e00000000040000ac14140cebdf2ce2", 0x14}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) [ 413.504455][T20824] device nr0 entered promiscuous mode [ 413.514615][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 413.520648][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:50:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000023140)={0x4, 0x5, 0xff, 0x100, 0x0, r0, 0x4, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x33c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r1, 0x28}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000002680)=[{0x0}], 0x1, 0x0, 0x0, 0xa0028000}, 0x0) r2 = socket$kcm(0x11, 0x100000000003, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)=@sco={0x1f, {0x608}}, 0x80, 0x0}, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301003e00000000040000ac14140cebdf2ce2", 0x14}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) 00:50:54 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x88, 0x67, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x7fffef55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, 0x0) [ 413.677423][T20833] device nr0 entered promiscuous mode [ 413.914496][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 413.920415][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:50:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000023140)={0x4, 0x5, 0xff, 0x100, 0x0, r0, 0x4, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x33c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r1, 0x28}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000002680)=[{0x0}], 0x1, 0x0, 0x0, 0xa0028000}, 0x0) r2 = socket$kcm(0x11, 0x100000000003, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)=@sco={0x1f, {0x608}}, 0x80, 0x0}, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301003e00000000040000ac14140cebdf2ce2", 0x14}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) 00:50:55 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='.\xdemec\xa3\\/cgr\t\x00\x00\x00net//yz\b\x00\r\xcdq\x8f\x8d\xfeH.\x857\x87U\x8a\x06@k.F\x13\x94\xcf\x9f\x01K\xc6\x80\xbay\xc1V\xe8\xe3Z\x90\xdb\xfc\r\xa0\xec\x143\xee\xfe\xe5\x1e\xd3\xf2\xa1I\xf1&\xe2\xb1\xceK\xc7)\xa5\xc9\x9f\xc4\x88Fz\xbf\x95\x1b\x01~\xc3]\xf08\x8f\x1be\x1b\xa6\xdd\xa5<\xc5\xfc\x00\xcb\xd6\xb0\xa1\xf3e\xea!\"\xc3\xb5Y\x98\xa1\xe5u\x9b\x12\xa5\xb6\xf2!F\xee', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r3, 0x801054db, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x3, 0x70, 0x40000, 0x0, 0x3, 0xdd7, 0x0, 0x0, 0x20, 0x2, 0x6, 0x0, 0x0, 0x1, 0x8, 0x2, 0x0, 0x8000, 0x8000000000, 0x0, 0x0, 0x0, 0x9, 0x2e, 0x2, 0x2000000000000, 0x1, 0x5, 0xff, 0x7, 0x80000001, 0xfffffffffffffffb, 0x9, 0x3, 0x2, 0x1, 0x0, 0x0, 0x0, 0x100, 0x6, @perf_bp={&(0x7f0000000600), 0x2}, 0x42, 0xfffffffffffffffc, 0x10000, 0x5, 0x5, 0x3f, 0xd8}, r4, 0xe, 0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000240)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0xffff, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x5000000, 0x0, 0x7fff, 0x0, 0x0, 0x200, 0x0, 0x4, 0x2, 0xffffffff, 0x5, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x8, 0x3, 0x17, 0x4, 0x10, 0x800, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x100, 0x80000001, 0x5, 0x0, 0x4, 0x7, 0xad5, 0x7f, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0)}, 0x100, 0x4000000000000000, 0x8, 0xd, 0x0, 0x6, 0x7}) r6 = getpid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x10001) perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0x0, 0x7fff, 0x1f, 0x4500, 0x0, 0x0, 0x801, 0x4, 0x5, 0x10000, 0x5, 0x0, 0x80000001, 0x3ff, 0x5, 0x2, 0x80, 0x0, 0x1, 0x3, 0x7, 0x5, 0x7fff, 0x28, 0x0, 0x6, 0x8, 0x8000, 0x3, 0x0, 0x9, 0xffffffffffffff90, 0x0, 0x3, 0x800, 0x7, 0x0, 0x42, 0x6, @perf_config_ext={0x101, 0x6}, 0x800, 0xffff, 0x100000001, 0x0, 0x0, 0x4, 0xfffffffffffffabe}, r6, 0xa, r5, 0x8) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) 00:50:55 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='.\xdemec\xa3\\/cgr\t\x00\x00\x00net//yz\b\x00\r\xcdq\x8f\x8d\xfeH.\x857\x87U\x8a\x06@k.F\x13\x94\xcf\x9f\x01K\xc6\x80\xbay\xc1V\xe8\xe3Z\x90\xdb\xfc\r\xa0\xec\x143\xee\xfe\xe5\x1e\xd3\xf2\xa1I\xf1&\xe2\xb1\xceK\xc7)\xa5\xc9\x9f\xc4\x88Fz\xbf\x95\x1b\x01~\xc3]\xf08\x8f\x1be\x1b\xa6\xdd\xa5<\xc5\xfc\x00\xcb\xd6\xb0\xa1\xf3e\xea!\"\xc3\xb5Y\x98\xa1\xe5u\x9b\x12\xa5\xb6\xf2!F\xee', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r3, 0x801054db, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x3, 0x70, 0x40000, 0x0, 0x3, 0xdd7, 0x0, 0x0, 0x20, 0x2, 0x6, 0x0, 0x0, 0x1, 0x8, 0x2, 0x0, 0x8000, 0x8000000000, 0x0, 0x0, 0x0, 0x9, 0x2e, 0x2, 0x2000000000000, 0x1, 0x5, 0xff, 0x7, 0x80000001, 0xfffffffffffffffb, 0x9, 0x3, 0x2, 0x1, 0x0, 0x0, 0x0, 0x100, 0x6, @perf_bp={&(0x7f0000000600), 0x2}, 0x42, 0xfffffffffffffffc, 0x10000, 0x5, 0x5, 0x3f, 0xd8}, r4, 0xe, 0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000240)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0xffff, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x5000000, 0x0, 0x7fff, 0x0, 0x0, 0x200, 0x0, 0x4, 0x2, 0xffffffff, 0x5, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x8, 0x3, 0x17, 0x4, 0x10, 0x800, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x100, 0x80000001, 0x5, 0x0, 0x4, 0x7, 0xad5, 0x7f, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0)}, 0x100, 0x4000000000000000, 0x8, 0xd, 0x0, 0x6, 0x7}) r6 = getpid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x10001) perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0x0, 0x7fff, 0x1f, 0x4500, 0x0, 0x0, 0x801, 0x4, 0x5, 0x10000, 0x5, 0x0, 0x80000001, 0x3ff, 0x5, 0x2, 0x80, 0x0, 0x1, 0x3, 0x7, 0x5, 0x7fff, 0x28, 0x0, 0x6, 0x8, 0x8000, 0x3, 0x0, 0x9, 0xffffffffffffff90, 0x0, 0x3, 0x800, 0x7, 0x0, 0x42, 0x6, @perf_config_ext={0x101, 0x6}, 0x800, 0xffff, 0x100000001, 0x0, 0x0, 0x4, 0xfffffffffffffabe}, r6, 0xa, r5, 0x8) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) 00:50:55 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x88, 0x67, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x7fffef55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, 0x0) 00:50:55 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) socket$kcm(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x200000000005, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xfff4) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x2ff8, 'memory'}]}, 0xfdef) 00:50:55 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) socket$kcm(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x200000000005, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xfff4) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x2ff8, 'memory'}]}, 0xfdef) 00:50:55 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='.\xdemec\xa3\\/cgr\t\x00\x00\x00net//yz\b\x00\r\xcdq\x8f\x8d\xfeH.\x857\x87U\x8a\x06@k.F\x13\x94\xcf\x9f\x01K\xc6\x80\xbay\xc1V\xe8\xe3Z\x90\xdb\xfc\r\xa0\xec\x143\xee\xfe\xe5\x1e\xd3\xf2\xa1I\xf1&\xe2\xb1\xceK\xc7)\xa5\xc9\x9f\xc4\x88Fz\xbf\x95\x1b\x01~\xc3]\xf08\x8f\x1be\x1b\xa6\xdd\xa5<\xc5\xfc\x00\xcb\xd6\xb0\xa1\xf3e\xea!\"\xc3\xb5Y\x98\xa1\xe5u\x9b\x12\xa5\xb6\xf2!F\xee', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r3, 0x801054db, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x3, 0x70, 0x40000, 0x0, 0x3, 0xdd7, 0x0, 0x0, 0x20, 0x2, 0x6, 0x0, 0x0, 0x1, 0x8, 0x2, 0x0, 0x8000, 0x8000000000, 0x0, 0x0, 0x0, 0x9, 0x2e, 0x2, 0x2000000000000, 0x1, 0x5, 0xff, 0x7, 0x80000001, 0xfffffffffffffffb, 0x9, 0x3, 0x2, 0x1, 0x0, 0x0, 0x0, 0x100, 0x6, @perf_bp={&(0x7f0000000600), 0x2}, 0x42, 0xfffffffffffffffc, 0x10000, 0x5, 0x5, 0x3f, 0xd8}, r4, 0xe, 0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000240)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0xffff, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x5000000, 0x0, 0x7fff, 0x0, 0x0, 0x200, 0x0, 0x4, 0x2, 0xffffffff, 0x5, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x8, 0x3, 0x17, 0x4, 0x10, 0x800, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x100, 0x80000001, 0x5, 0x0, 0x4, 0x7, 0xad5, 0x7f, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0)}, 0x100, 0x4000000000000000, 0x8, 0xd, 0x0, 0x6, 0x7}) r6 = getpid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x10001) perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0x0, 0x7fff, 0x1f, 0x4500, 0x0, 0x0, 0x801, 0x4, 0x5, 0x10000, 0x5, 0x0, 0x80000001, 0x3ff, 0x5, 0x2, 0x80, 0x0, 0x1, 0x3, 0x7, 0x5, 0x7fff, 0x28, 0x0, 0x6, 0x8, 0x8000, 0x3, 0x0, 0x9, 0xffffffffffffff90, 0x0, 0x3, 0x800, 0x7, 0x0, 0x42, 0x6, @perf_config_ext={0x101, 0x6}, 0x800, 0xffff, 0x100000001, 0x0, 0x0, 0x4, 0xfffffffffffffabe}, r6, 0xa, r5, 0x8) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) [ 414.706891][T20872] device nr0 entered promiscuous mode 00:50:55 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x88, 0x67, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x7fffef55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, 0x0) [ 414.795380][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 414.803259][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:50:56 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='.\xdemec\xa3\\/cgr\t\x00\x00\x00net//yz\b\x00\r\xcdq\x8f\x8d\xfeH.\x857\x87U\x8a\x06@k.F\x13\x94\xcf\x9f\x01K\xc6\x80\xbay\xc1V\xe8\xe3Z\x90\xdb\xfc\r\xa0\xec\x143\xee\xfe\xe5\x1e\xd3\xf2\xa1I\xf1&\xe2\xb1\xceK\xc7)\xa5\xc9\x9f\xc4\x88Fz\xbf\x95\x1b\x01~\xc3]\xf08\x8f\x1be\x1b\xa6\xdd\xa5<\xc5\xfc\x00\xcb\xd6\xb0\xa1\xf3e\xea!\"\xc3\xb5Y\x98\xa1\xe5u\x9b\x12\xa5\xb6\xf2!F\xee', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r3, 0x801054db, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x3, 0x70, 0x40000, 0x0, 0x3, 0xdd7, 0x0, 0x0, 0x20, 0x2, 0x6, 0x0, 0x0, 0x1, 0x8, 0x2, 0x0, 0x8000, 0x8000000000, 0x0, 0x0, 0x0, 0x9, 0x2e, 0x2, 0x2000000000000, 0x1, 0x5, 0xff, 0x7, 0x80000001, 0xfffffffffffffffb, 0x9, 0x3, 0x2, 0x1, 0x0, 0x0, 0x0, 0x100, 0x6, @perf_bp={&(0x7f0000000600), 0x2}, 0x42, 0xfffffffffffffffc, 0x10000, 0x5, 0x5, 0x3f, 0xd8}, r4, 0xe, 0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000240)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0xffff, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x5000000, 0x0, 0x7fff, 0x0, 0x0, 0x200, 0x0, 0x4, 0x2, 0xffffffff, 0x5, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x8, 0x3, 0x17, 0x4, 0x10, 0x800, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x100, 0x80000001, 0x5, 0x0, 0x4, 0x7, 0xad5, 0x7f, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0)}, 0x100, 0x4000000000000000, 0x8, 0xd, 0x0, 0x6, 0x7}) r6 = getpid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x10001) perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0x0, 0x7fff, 0x1f, 0x4500, 0x0, 0x0, 0x801, 0x4, 0x5, 0x10000, 0x5, 0x0, 0x80000001, 0x3ff, 0x5, 0x2, 0x80, 0x0, 0x1, 0x3, 0x7, 0x5, 0x7fff, 0x28, 0x0, 0x6, 0x8, 0x8000, 0x3, 0x0, 0x9, 0xffffffffffffff90, 0x0, 0x3, 0x800, 0x7, 0x0, 0x42, 0x6, @perf_config_ext={0x101, 0x6}, 0x800, 0xffff, 0x100000001, 0x0, 0x0, 0x4, 0xfffffffffffffabe}, r6, 0xa, r5, 0x8) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) 00:50:56 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) socket$kcm(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x200000000005, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xfff4) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x2ff8, 'memory'}]}, 0xfdef) 00:50:56 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) socket$kcm(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x200000000005, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xfff4) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x2ff8, 'memory'}]}, 0xfdef) 00:50:56 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='.\xdemec\xa3\\/cgr\t\x00\x00\x00net//yz\b\x00\r\xcdq\x8f\x8d\xfeH.\x857\x87U\x8a\x06@k.F\x13\x94\xcf\x9f\x01K\xc6\x80\xbay\xc1V\xe8\xe3Z\x90\xdb\xfc\r\xa0\xec\x143\xee\xfe\xe5\x1e\xd3\xf2\xa1I\xf1&\xe2\xb1\xceK\xc7)\xa5\xc9\x9f\xc4\x88Fz\xbf\x95\x1b\x01~\xc3]\xf08\x8f\x1be\x1b\xa6\xdd\xa5<\xc5\xfc\x00\xcb\xd6\xb0\xa1\xf3e\xea!\"\xc3\xb5Y\x98\xa1\xe5u\x9b\x12\xa5\xb6\xf2!F\xee', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r3, 0x801054db, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x3, 0x70, 0x40000, 0x0, 0x3, 0xdd7, 0x0, 0x0, 0x20, 0x2, 0x6, 0x0, 0x0, 0x1, 0x8, 0x2, 0x0, 0x8000, 0x8000000000, 0x0, 0x0, 0x0, 0x9, 0x2e, 0x2, 0x2000000000000, 0x1, 0x5, 0xff, 0x7, 0x80000001, 0xfffffffffffffffb, 0x9, 0x3, 0x2, 0x1, 0x0, 0x0, 0x0, 0x100, 0x6, @perf_bp={&(0x7f0000000600), 0x2}, 0x42, 0xfffffffffffffffc, 0x10000, 0x5, 0x5, 0x3f, 0xd8}, r4, 0xe, 0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000240)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0xffff, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x5000000, 0x0, 0x7fff, 0x0, 0x0, 0x200, 0x0, 0x4, 0x2, 0xffffffff, 0x5, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x8, 0x3, 0x17, 0x4, 0x10, 0x800, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x100, 0x80000001, 0x5, 0x0, 0x4, 0x7, 0xad5, 0x7f, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0)}, 0x100, 0x4000000000000000, 0x8, 0xd, 0x0, 0x6, 0x7}) r6 = getpid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x10001) perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0x0, 0x7fff, 0x1f, 0x4500, 0x0, 0x0, 0x801, 0x4, 0x5, 0x10000, 0x5, 0x0, 0x80000001, 0x3ff, 0x5, 0x2, 0x80, 0x0, 0x1, 0x3, 0x7, 0x5, 0x7fff, 0x28, 0x0, 0x6, 0x8, 0x8000, 0x3, 0x0, 0x9, 0xffffffffffffff90, 0x0, 0x3, 0x800, 0x7, 0x0, 0x42, 0x6, @perf_config_ext={0x101, 0x6}, 0x800, 0xffff, 0x100000001, 0x0, 0x0, 0x4, 0xfffffffffffffabe}, r6, 0xa, r5, 0x8) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) 00:50:56 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='.\xdemec\xa3\\/cgr\t\x00\x00\x00net//yz\b\x00\r\xcdq\x8f\x8d\xfeH.\x857\x87U\x8a\x06@k.F\x13\x94\xcf\x9f\x01K\xc6\x80\xbay\xc1V\xe8\xe3Z\x90\xdb\xfc\r\xa0\xec\x143\xee\xfe\xe5\x1e\xd3\xf2\xa1I\xf1&\xe2\xb1\xceK\xc7)\xa5\xc9\x9f\xc4\x88Fz\xbf\x95\x1b\x01~\xc3]\xf08\x8f\x1be\x1b\xa6\xdd\xa5<\xc5\xfc\x00\xcb\xd6\xb0\xa1\xf3e\xea!\"\xc3\xb5Y\x98\xa1\xe5u\x9b\x12\xa5\xb6\xf2!F\xee', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r3, 0x801054db, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x3, 0x70, 0x40000, 0x0, 0x3, 0xdd7, 0x0, 0x0, 0x20, 0x2, 0x6, 0x0, 0x0, 0x1, 0x8, 0x2, 0x0, 0x8000, 0x8000000000, 0x0, 0x0, 0x0, 0x9, 0x2e, 0x2, 0x2000000000000, 0x1, 0x5, 0xff, 0x7, 0x80000001, 0xfffffffffffffffb, 0x9, 0x3, 0x2, 0x1, 0x0, 0x0, 0x0, 0x100, 0x6, @perf_bp={&(0x7f0000000600), 0x2}, 0x42, 0xfffffffffffffffc, 0x10000, 0x5, 0x5, 0x3f, 0xd8}, r4, 0xe, 0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000240)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0xffff, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x5000000, 0x0, 0x7fff, 0x0, 0x0, 0x200, 0x0, 0x4, 0x2, 0xffffffff, 0x5, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x8, 0x3, 0x17, 0x4, 0x10, 0x800, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x100, 0x80000001, 0x5, 0x0, 0x4, 0x7, 0xad5, 0x7f, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0)}, 0x100, 0x4000000000000000, 0x8, 0xd, 0x0, 0x6, 0x7}) r6 = getpid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x10001) perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0x0, 0x7fff, 0x1f, 0x4500, 0x0, 0x0, 0x801, 0x4, 0x5, 0x10000, 0x5, 0x0, 0x80000001, 0x3ff, 0x5, 0x2, 0x80, 0x0, 0x1, 0x3, 0x7, 0x5, 0x7fff, 0x28, 0x0, 0x6, 0x8, 0x8000, 0x3, 0x0, 0x9, 0xffffffffffffff90, 0x0, 0x3, 0x800, 0x7, 0x0, 0x42, 0x6, @perf_config_ext={0x101, 0x6}, 0x800, 0xffff, 0x100000001, 0x0, 0x0, 0x4, 0xfffffffffffffabe}, r6, 0xa, r5, 0x8) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) [ 415.364400][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 415.370234][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 415.395105][T20891] device nr0 entered promiscuous mode 00:50:56 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='.\xdemec\xa3\\/cgr\t\x00\x00\x00net//yz\b\x00\r\xcdq\x8f\x8d\xfeH.\x857\x87U\x8a\x06@k.F\x13\x94\xcf\x9f\x01K\xc6\x80\xbay\xc1V\xe8\xe3Z\x90\xdb\xfc\r\xa0\xec\x143\xee\xfe\xe5\x1e\xd3\xf2\xa1I\xf1&\xe2\xb1\xceK\xc7)\xa5\xc9\x9f\xc4\x88Fz\xbf\x95\x1b\x01~\xc3]\xf08\x8f\x1be\x1b\xa6\xdd\xa5<\xc5\xfc\x00\xcb\xd6\xb0\xa1\xf3e\xea!\"\xc3\xb5Y\x98\xa1\xe5u\x9b\x12\xa5\xb6\xf2!F\xee', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r3, 0x801054db, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x3, 0x70, 0x40000, 0x0, 0x3, 0xdd7, 0x0, 0x0, 0x20, 0x2, 0x6, 0x0, 0x0, 0x1, 0x8, 0x2, 0x0, 0x8000, 0x8000000000, 0x0, 0x0, 0x0, 0x9, 0x2e, 0x2, 0x2000000000000, 0x1, 0x5, 0xff, 0x7, 0x80000001, 0xfffffffffffffffb, 0x9, 0x3, 0x2, 0x1, 0x0, 0x0, 0x0, 0x100, 0x6, @perf_bp={&(0x7f0000000600), 0x2}, 0x42, 0xfffffffffffffffc, 0x10000, 0x5, 0x5, 0x3f, 0xd8}, r4, 0xe, 0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000240)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0xffff, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x5000000, 0x0, 0x7fff, 0x0, 0x0, 0x200, 0x0, 0x4, 0x2, 0xffffffff, 0x5, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x8, 0x3, 0x17, 0x4, 0x10, 0x800, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x100, 0x80000001, 0x5, 0x0, 0x4, 0x7, 0xad5, 0x7f, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0)}, 0x100, 0x4000000000000000, 0x8, 0xd, 0x0, 0x6, 0x7}) r6 = getpid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x10001) perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0x0, 0x7fff, 0x1f, 0x4500, 0x0, 0x0, 0x801, 0x4, 0x5, 0x10000, 0x5, 0x0, 0x80000001, 0x3ff, 0x5, 0x2, 0x80, 0x0, 0x1, 0x3, 0x7, 0x5, 0x7fff, 0x28, 0x0, 0x6, 0x8, 0x8000, 0x3, 0x0, 0x9, 0xffffffffffffff90, 0x0, 0x3, 0x800, 0x7, 0x0, 0x42, 0x6, @perf_config_ext={0x101, 0x6}, 0x800, 0xffff, 0x100000001, 0x0, 0x0, 0x4, 0xfffffffffffffabe}, r6, 0xa, r5, 0x8) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) [ 415.636013][T20909] device nr0 entered promiscuous mode 00:50:57 executing program 2: r0 = socket$kcm(0x10, 0x400000002, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="48000000140081ae08060c04000f006b02027f03fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82afb9bbc7a461eb886a5e54e8ff53144", 0x48}], 0x1}, 0x0) 00:50:57 executing program 0: r0 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x7, 0x2009, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 00:50:57 executing program 2: r0 = socket$kcm(0x10, 0x400000002, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="48000000140081ae08060c04000f006b02027f03fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82afb9bbc7a461eb886a5e54e8ff53144", 0x48}], 0x1}, 0x0) 00:50:57 executing program 2: r0 = socket$kcm(0x10, 0x400000002, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="48000000140081ae08060c04000f006b02027f03fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82afb9bbc7a461eb886a5e54e8ff53144", 0x48}], 0x1}, 0x0) [ 416.184105][T20917] device nr0 entered promiscuous mode 00:50:57 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 00:50:57 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='.\xdemec\xa3\\/cgr\t\x00\x00\x00net//yz\b\x00\r\xcdq\x8f\x8d\xfeH.\x857\x87U\x8a\x06@k.F\x13\x94\xcf\x9f\x01K\xc6\x80\xbay\xc1V\xe8\xe3Z\x90\xdb\xfc\r\xa0\xec\x143\xee\xfe\xe5\x1e\xd3\xf2\xa1I\xf1&\xe2\xb1\xceK\xc7)\xa5\xc9\x9f\xc4\x88Fz\xbf\x95\x1b\x01~\xc3]\xf08\x8f\x1be\x1b\xa6\xdd\xa5<\xc5\xfc\x00\xcb\xd6\xb0\xa1\xf3e\xea!\"\xc3\xb5Y\x98\xa1\xe5u\x9b\x12\xa5\xb6\xf2!F\xee', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r3, 0x801054db, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x3, 0x70, 0x40000, 0x0, 0x3, 0xdd7, 0x0, 0x0, 0x20, 0x2, 0x6, 0x0, 0x0, 0x1, 0x8, 0x2, 0x0, 0x8000, 0x8000000000, 0x0, 0x0, 0x0, 0x9, 0x2e, 0x2, 0x2000000000000, 0x1, 0x5, 0xff, 0x7, 0x80000001, 0xfffffffffffffffb, 0x9, 0x3, 0x2, 0x1, 0x0, 0x0, 0x0, 0x100, 0x6, @perf_bp={&(0x7f0000000600), 0x2}, 0x42, 0xfffffffffffffffc, 0x10000, 0x5, 0x5, 0x3f, 0xd8}, r4, 0xe, 0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000240)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0xffff, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x5000000, 0x0, 0x7fff, 0x0, 0x0, 0x200, 0x0, 0x4, 0x2, 0xffffffff, 0x5, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x8, 0x3, 0x17, 0x4, 0x10, 0x800, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x100, 0x80000001, 0x5, 0x0, 0x4, 0x7, 0xad5, 0x7f, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0)}, 0x100, 0x4000000000000000, 0x8, 0xd, 0x0, 0x6, 0x7}) r6 = getpid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x10001) perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0x0, 0x7fff, 0x1f, 0x4500, 0x0, 0x0, 0x801, 0x4, 0x5, 0x10000, 0x5, 0x0, 0x80000001, 0x3ff, 0x5, 0x2, 0x80, 0x0, 0x1, 0x3, 0x7, 0x5, 0x7fff, 0x28, 0x0, 0x6, 0x8, 0x8000, 0x3, 0x0, 0x9, 0xffffffffffffff90, 0x0, 0x3, 0x800, 0x7, 0x0, 0x42, 0x6, @perf_config_ext={0x101, 0x6}, 0x800, 0xffff, 0x100000001, 0x0, 0x0, 0x4, 0xfffffffffffffabe}, r6, 0xa, r5, 0x8) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) 00:50:57 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x2}) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) close(r0) 00:50:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439fce41f144631ac262dcae08c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="39000000140081ae00003c9733f5f087110008abead99025e4ca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702fc", 0x39}], 0x1}, 0x0) 00:50:57 executing program 2: r0 = socket$kcm(0x10, 0x400000002, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="48000000140081ae08060c04000f006b02027f03fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82afb9bbc7a461eb886a5e54e8ff53144", 0x48}], 0x1}, 0x0) 00:50:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439fce41f144631ac262dcae08c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="39000000140081ae00003c9733f5f087110008abead99025e4ca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702fc", 0x39}], 0x1}, 0x0) 00:50:57 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) [ 416.872352][T20955] device nr0 entered promiscuous mode 00:50:58 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='.\xdemec\xa3\\/cgr\t\x00\x00\x00net//yz\b\x00\r\xcdq\x8f\x8d\xfeH.\x857\x87U\x8a\x06@k.F\x13\x94\xcf\x9f\x01K\xc6\x80\xbay\xc1V\xe8\xe3Z\x90\xdb\xfc\r\xa0\xec\x143\xee\xfe\xe5\x1e\xd3\xf2\xa1I\xf1&\xe2\xb1\xceK\xc7)\xa5\xc9\x9f\xc4\x88Fz\xbf\x95\x1b\x01~\xc3]\xf08\x8f\x1be\x1b\xa6\xdd\xa5<\xc5\xfc\x00\xcb\xd6\xb0\xa1\xf3e\xea!\"\xc3\xb5Y\x98\xa1\xe5u\x9b\x12\xa5\xb6\xf2!F\xee', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r3, 0x801054db, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x3, 0x70, 0x40000, 0x0, 0x3, 0xdd7, 0x0, 0x0, 0x20, 0x2, 0x6, 0x0, 0x0, 0x1, 0x8, 0x2, 0x0, 0x8000, 0x8000000000, 0x0, 0x0, 0x0, 0x9, 0x2e, 0x2, 0x2000000000000, 0x1, 0x5, 0xff, 0x7, 0x80000001, 0xfffffffffffffffb, 0x9, 0x3, 0x2, 0x1, 0x0, 0x0, 0x0, 0x100, 0x6, @perf_bp={&(0x7f0000000600), 0x2}, 0x42, 0xfffffffffffffffc, 0x10000, 0x5, 0x5, 0x3f, 0xd8}, r4, 0xe, 0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000240)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0xffff, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x5000000, 0x0, 0x7fff, 0x0, 0x0, 0x200, 0x0, 0x4, 0x2, 0xffffffff, 0x5, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x8, 0x3, 0x17, 0x4, 0x10, 0x800, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x100, 0x80000001, 0x5, 0x0, 0x4, 0x7, 0xad5, 0x7f, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0)}, 0x100, 0x4000000000000000, 0x8, 0xd, 0x0, 0x6, 0x7}) r6 = getpid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x10001) perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0x0, 0x7fff, 0x1f, 0x4500, 0x0, 0x0, 0x801, 0x4, 0x5, 0x10000, 0x5, 0x0, 0x80000001, 0x3ff, 0x5, 0x2, 0x80, 0x0, 0x1, 0x3, 0x7, 0x5, 0x7fff, 0x28, 0x0, 0x6, 0x8, 0x8000, 0x3, 0x0, 0x9, 0xffffffffffffff90, 0x0, 0x3, 0x800, 0x7, 0x0, 0x42, 0x6, @perf_config_ext={0x101, 0x6}, 0x800, 0xffff, 0x100000001, 0x0, 0x0, 0x4, 0xfffffffffffffabe}, r6, 0xa, r5, 0x8) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) 00:50:58 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 00:50:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439fce41f144631ac262dcae08c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="39000000140081ae00003c9733f5f087110008abead99025e4ca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702fc", 0x39}], 0x1}, 0x0) 00:50:58 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 00:50:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439fce41f144631ac262dcae08c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="39000000140081ae00003c9733f5f087110008abead99025e4ca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702fc", 0x39}], 0x1}, 0x0) 00:50:58 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) [ 417.340730][T20984] device nr0 entered promiscuous mode 00:50:58 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='.\xdemec\xa3\\/cgr\t\x00\x00\x00net//yz\b\x00\r\xcdq\x8f\x8d\xfeH.\x857\x87U\x8a\x06@k.F\x13\x94\xcf\x9f\x01K\xc6\x80\xbay\xc1V\xe8\xe3Z\x90\xdb\xfc\r\xa0\xec\x143\xee\xfe\xe5\x1e\xd3\xf2\xa1I\xf1&\xe2\xb1\xceK\xc7)\xa5\xc9\x9f\xc4\x88Fz\xbf\x95\x1b\x01~\xc3]\xf08\x8f\x1be\x1b\xa6\xdd\xa5<\xc5\xfc\x00\xcb\xd6\xb0\xa1\xf3e\xea!\"\xc3\xb5Y\x98\xa1\xe5u\x9b\x12\xa5\xb6\xf2!F\xee', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r3, 0x801054db, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x3, 0x70, 0x40000, 0x0, 0x3, 0xdd7, 0x0, 0x0, 0x20, 0x2, 0x6, 0x0, 0x0, 0x1, 0x8, 0x2, 0x0, 0x8000, 0x8000000000, 0x0, 0x0, 0x0, 0x9, 0x2e, 0x2, 0x2000000000000, 0x1, 0x5, 0xff, 0x7, 0x80000001, 0xfffffffffffffffb, 0x9, 0x3, 0x2, 0x1, 0x0, 0x0, 0x0, 0x100, 0x6, @perf_bp={&(0x7f0000000600), 0x2}, 0x42, 0xfffffffffffffffc, 0x10000, 0x5, 0x5, 0x3f, 0xd8}, r4, 0xe, 0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000240)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0xffff, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x5000000, 0x0, 0x7fff, 0x0, 0x0, 0x200, 0x0, 0x4, 0x2, 0xffffffff, 0x5, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x8, 0x3, 0x17, 0x4, 0x10, 0x800, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x100, 0x80000001, 0x5, 0x0, 0x4, 0x7, 0xad5, 0x7f, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0)}, 0x100, 0x4000000000000000, 0x8, 0xd, 0x0, 0x6, 0x7}) r6 = getpid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x10001) perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0x0, 0x7fff, 0x1f, 0x4500, 0x0, 0x0, 0x801, 0x4, 0x5, 0x10000, 0x5, 0x0, 0x80000001, 0x3ff, 0x5, 0x2, 0x80, 0x0, 0x1, 0x3, 0x7, 0x5, 0x7fff, 0x28, 0x0, 0x6, 0x8, 0x8000, 0x3, 0x0, 0x9, 0xffffffffffffff90, 0x0, 0x3, 0x800, 0x7, 0x0, 0x42, 0x6, @perf_config_ext={0x101, 0x6}, 0x800, 0xffff, 0x100000001, 0x0, 0x0, 0x4, 0xfffffffffffffabe}, r6, 0xa, r5, 0x8) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) 00:50:58 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x2}) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) close(r0) 00:50:58 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 00:50:58 executing program 5: socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) mkdirat$cgroup(r4, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000120081f87059ae08060c04000a006b10400103fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) write$cgroup_int(r5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000240)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) 00:50:58 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 00:50:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000280)={[{0x0, 'pids'}]}, 0x253) write$cgroup_int(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) [ 417.663933][T20998] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 417.715459][T20998] CPU: 1 PID: 20998 Comm: syz-executor.5 Not tainted 5.3.0-rc3+ #0 [ 417.723391][T20998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.733448][T20998] Call Trace: [ 417.736740][T20998] dump_stack+0x172/0x1f0 [ 417.741072][T20998] dump_header+0x10b/0x82d [ 417.745491][T20998] ? oom_kill_process+0x94/0x3f0 [ 417.750431][T20998] oom_kill_process.cold+0x10/0x15 [ 417.755546][T20998] out_of_memory+0x79a/0x12c0 [ 417.760224][T20998] ? lock_downgrade+0x920/0x920 [ 417.765072][T20998] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 417.770878][T20998] ? oom_killer_disable+0x280/0x280 [ 417.776091][T20998] mem_cgroup_out_of_memory+0x1d8/0x240 [ 417.781637][T20998] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 417.787277][T20998] ? do_raw_spin_unlock+0x57/0x270 [ 417.792391][T20998] ? _raw_spin_unlock+0x2d/0x50 [ 417.797245][T20998] try_charge+0xf4b/0x1440 [ 417.801677][T20998] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 417.807221][T20998] ? percpu_ref_tryget_live+0x111/0x290 [ 417.812940][T20998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.819184][T20998] ? __kasan_check_read+0x11/0x20 [ 417.824210][T20998] ? get_mem_cgroup_from_mm+0x156/0x320 [ 417.829748][T20998] mem_cgroup_try_charge+0x136/0x590 [ 417.835030][T20998] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 417.840668][T20998] __handle_mm_fault+0x1e3a/0x3f20 [ 417.845787][T20998] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 417.851349][T20998] ? __kasan_check_read+0x11/0x20 [ 417.856384][T20998] handle_mm_fault+0x1b5/0x6b0 [ 417.861153][T20998] __do_page_fault+0x536/0xdd0 [ 417.865929][T20998] do_page_fault+0x38/0x590 [ 417.870438][T20998] page_fault+0x39/0x40 [ 417.874590][T20998] RIP: 0033:0x4111bf [ 417.874604][T20998] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 417.874611][T20998] RSP: 002b:00007ffe5c23ce00 EFLAGS: 00010206 [ 417.874623][T20998] RAX: 00007f08080f3000 RBX: 0000000000020000 RCX: 00000000004598ca [ 417.874631][T20998] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 417.874638][T20998] RBP: 00007ffe5c23cee0 R08: ffffffffffffffff R09: 0000000000000000 [ 417.874650][T20998] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe5c23cfd0 [ 417.935995][T20998] R13: 00007f0808113700 R14: 0000000000000001 R15: 000000000075bfd4 [ 417.945898][T20998] memory: usage 6992kB, limit 0kB, failcnt 19 [ 417.952106][T20998] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 417.959375][T20998] Memory cgroup stats for /syz5: [ 417.959474][T20998] anon 2297856 [ 417.959474][T20998] file 122880 [ 417.959474][T20998] kernel_stack 65536 [ 417.959474][T20998] slab 4636672 [ 417.959474][T20998] sock 135168 [ 417.959474][T20998] shmem 0 [ 417.959474][T20998] file_mapped 0 [ 417.959474][T20998] file_dirty 135168 [ 417.959474][T20998] file_writeback 0 [ 417.959474][T20998] anon_thp 2097152 [ 417.959474][T20998] inactive_anon 0 [ 417.959474][T20998] active_anon 2228224 [ 417.959474][T20998] inactive_file 0 [ 417.959474][T20998] active_file 0 [ 417.959474][T20998] unevictable 0 [ 417.959474][T20998] slab_reclaimable 2027520 [ 417.959474][T20998] slab_unreclaimable 2609152 [ 417.959474][T20998] pgfault 36696 [ 417.959474][T20998] pgmajfault 0 [ 417.959474][T20998] workingset_refault 0 [ 417.959474][T20998] workingset_activate 0 [ 417.959474][T20998] workingset_nodereclaim 0 [ 417.959474][T20998] pgrefill 0 [ 417.959474][T20998] pgscan 0 [ 417.959474][T20998] pgsteal 0 [ 417.959474][T20998] pgactivate 0 [ 417.964598][T20998] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=20998,uid=0 [ 418.071950][T20998] Memory cgroup out of memory: Killed process 20998 (syz-executor.5) total-vm:72708kB, anon-rss:2156kB, file-rss:34816kB, shmem-rss:0kB [ 418.089448][ T1058] oom_reaper: reaped process 20998 (syz-executor.5), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB 00:50:59 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 00:50:59 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000280)={[{0x0, 'pids'}]}, 0x253) write$cgroup_int(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 00:50:59 executing program 5: socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) mkdirat$cgroup(r4, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000120081f87059ae08060c04000a006b10400103fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) write$cgroup_int(r5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000240)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) [ 418.263338][T21011] device nr0 entered promiscuous mode 00:50:59 executing program 3: socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) mkdirat$cgroup(r4, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000120081f87059ae08060c04000a006b10400103fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) write$cgroup_int(r5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000240)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) [ 418.305993][T19245] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 418.377152][T19245] CPU: 0 PID: 19245 Comm: syz-executor.5 Not tainted 5.3.0-rc3+ #0 [ 418.385087][T19245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.395149][T19245] Call Trace: [ 418.398468][T19245] dump_stack+0x172/0x1f0 [ 418.402809][T19245] dump_header+0x10b/0x82d [ 418.407231][T19245] ? oom_kill_process+0x94/0x3f0 [ 418.412174][T19245] oom_kill_process.cold+0x10/0x15 [ 418.417294][T19245] out_of_memory+0x79a/0x12c0 [ 418.421977][T19245] ? lock_downgrade+0x920/0x920 [ 418.426833][T19245] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 418.432649][T19245] ? oom_killer_disable+0x280/0x280 [ 418.437866][T19245] mem_cgroup_out_of_memory+0x1d8/0x240 [ 418.443427][T19245] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 418.449071][T19245] ? do_raw_spin_unlock+0x57/0x270 [ 418.454190][T19245] ? _raw_spin_unlock+0x2d/0x50 [ 418.459044][T19245] try_charge+0xf4b/0x1440 [ 418.463469][T19245] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 418.469017][T19245] ? find_held_lock+0x35/0x130 [ 418.473789][T19245] ? get_mem_cgroup_from_mm+0x139/0x320 [ 418.479348][T19245] ? lock_downgrade+0x920/0x920 [ 418.484202][T19245] ? percpu_ref_tryget_live+0x111/0x290 [ 418.489756][T19245] __memcg_kmem_charge_memcg+0x71/0xf0 [ 418.495215][T19245] ? memcg_kmem_put_cache+0x50/0x50 [ 418.500440][T19245] ? get_mem_cgroup_from_mm+0x156/0x320 [ 418.505992][T19245] __memcg_kmem_charge+0x13a/0x3a0 [ 418.511116][T19245] __alloc_pages_nodemask+0x4f4/0x900 [ 418.516485][T19245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 418.522752][T19245] ? __alloc_pages_slowpath+0x2520/0x2520 [ 418.528477][T19245] ? copy_process+0x46d1/0x6b00 [ 418.533343][T19245] ? lockdep_hardirqs_on+0x418/0x5d0 [ 418.538637][T19245] ? trace_hardirqs_on+0x67/0x240 [ 418.543667][T19245] ? __kasan_check_read+0x11/0x20 [ 418.548705][T19245] copy_process+0x3f8/0x6b00 [ 418.553320][T19245] ? __kasan_check_read+0x11/0x20 [ 418.558347][T19245] ? __lock_acquire+0x1702/0x4c30 [ 418.563384][T19245] ? __kasan_check_read+0x11/0x20 [ 418.568419][T19245] ? mark_lock+0xc0/0x11e0 [ 418.572852][T19245] ? __cleanup_sighand+0x60/0x60 [ 418.577794][T19245] ? find_held_lock+0x35/0x130 [ 418.582577][T19245] _do_fork+0x146/0xfa0 [ 418.586744][T19245] ? copy_init_mm+0x20/0x20 [ 418.591256][T19245] ? __kasan_check_read+0x11/0x20 [ 418.596281][T19245] ? _copy_to_user+0x118/0x160 [ 418.601077][T19245] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 418.607320][T19245] ? put_timespec64+0xda/0x140 [ 418.612101][T19245] __x64_sys_clone+0x18d/0x250 [ 418.616867][T19245] ? __ia32_sys_vfork+0xc0/0xc0 [ 418.621725][T19245] ? lockdep_hardirqs_on+0x418/0x5d0 [ 418.627016][T19245] ? trace_hardirqs_on+0x67/0x240 [ 418.632045][T19245] do_syscall_64+0xfd/0x6a0 [ 418.636561][T19245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.642452][T19245] RIP: 0033:0x457e4a [ 418.646447][T19245] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 418.666049][T19245] RSP: 002b:00007ffe5c23d050 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 418.674555][T19245] RAX: ffffffffffffffda RBX: 00007ffe5c23d050 RCX: 0000000000457e4a [ 418.682548][T19245] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 418.690519][T19245] RBP: 00007ffe5c23d090 R08: 0000000000000001 R09: 0000555557000940 [ 418.698489][T19245] R10: 0000555557000c10 R11: 0000000000000246 R12: 0000000000000001 [ 418.706457][T19245] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe5c23d0e0 [ 418.717871][T19245] memory: usage 4644kB, limit 0kB, failcnt 28 [ 418.724493][T19245] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 418.731702][T19245] Memory cgroup stats for /syz5: [ 418.731814][T19245] anon 135168 [ 418.731814][T19245] file 122880 [ 418.731814][T19245] kernel_stack 0 [ 418.731814][T19245] slab 4636672 [ 418.731814][T19245] sock 135168 [ 418.731814][T19245] shmem 0 [ 418.731814][T19245] file_mapped 0 [ 418.731814][T19245] file_dirty 135168 [ 418.731814][T19245] file_writeback 0 [ 418.731814][T19245] anon_thp 0 [ 418.731814][T19245] inactive_anon 0 [ 418.731814][T19245] active_anon 65536 00:50:59 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x2}) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) close(r0) [ 418.731814][T19245] inactive_file 0 [ 418.731814][T19245] active_file 0 [ 418.731814][T19245] unevictable 0 [ 418.731814][T19245] slab_reclaimable 2027520 [ 418.731814][T19245] slab_unreclaimable 2609152 [ 418.731814][T19245] pgfault 36696 [ 418.731814][T19245] pgmajfault 0 [ 418.731814][T19245] workingset_refault 0 [ 418.731814][T19245] workingset_activate 0 [ 418.731814][T19245] workingset_nodereclaim 0 [ 418.731814][T19245] pgrefill 0 [ 418.731814][T19245] pgscan 0 [ 418.731814][T19245] pgsteal 0 [ 418.731814][T19245] pgactivate 0 [ 418.829184][T19245] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=19245,uid=0 [ 418.860533][T19245] Memory cgroup out of memory: Killed process 19245 (syz-executor.5) total-vm:72444kB, anon-rss:108kB, file-rss:35776kB, shmem-rss:0kB 00:50:59 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000280)={[{0x0, 'pids'}]}, 0x253) write$cgroup_int(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) [ 418.881249][T21029] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 418.902397][T21029] CPU: 1 PID: 21029 Comm: syz-executor.3 Not tainted 5.3.0-rc3+ #0 [ 418.910331][T21029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.910337][T21029] Call Trace: [ 418.910364][T21029] dump_stack+0x172/0x1f0 [ 418.910385][T21029] dump_header+0x10b/0x82d [ 418.910402][T21029] ? oom_kill_process+0x94/0x3f0 [ 418.923755][T21029] oom_kill_process.cold+0x10/0x15 [ 418.923775][T21029] out_of_memory+0x79a/0x12c0 [ 418.923790][T21029] ? lock_downgrade+0x920/0x920 [ 418.923809][T21029] ? oom_killer_disable+0x280/0x280 [ 418.932549][T21029] mem_cgroup_out_of_memory+0x1d8/0x240 [ 418.932566][T21029] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 418.932586][T21029] ? do_raw_spin_unlock+0x57/0x270 [ 418.932604][T21029] ? _raw_spin_unlock+0x2d/0x50 [ 418.978557][T21029] try_charge+0xf4b/0x1440 [ 418.983001][T21029] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 418.988553][T21029] ? percpu_ref_tryget_live+0x111/0x290 [ 418.994099][T21029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.000357][T21029] ? __kasan_check_read+0x11/0x20 [ 419.005406][T21029] ? get_mem_cgroup_from_mm+0x156/0x320 [ 419.011137][T21029] mem_cgroup_try_charge+0x136/0x590 [ 419.016445][T21029] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 419.022100][T21029] __handle_mm_fault+0x1e3a/0x3f20 [ 419.027234][T21029] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 419.032815][T21029] ? __kasan_check_read+0x11/0x20 [ 419.037955][T21029] handle_mm_fault+0x1b5/0x6b0 [ 419.042827][T21029] __do_page_fault+0x536/0xdd0 [ 419.047612][T21029] do_page_fault+0x38/0x590 [ 419.052133][T21029] page_fault+0x39/0x40 [ 419.056296][T21029] RIP: 0033:0x4111bf [ 419.060201][T21029] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 419.079810][T21029] RSP: 002b:00007ffda27c49b0 EFLAGS: 00010206 [ 419.079823][T21029] RAX: 00007f33b02f0000 RBX: 0000000000020000 RCX: 00000000004598ca [ 419.079830][T21029] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 419.079838][T21029] RBP: 00007ffda27c4a90 R08: ffffffffffffffff R09: 0000000000000000 [ 419.079844][T21029] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffda27c4b80 [ 419.079851][T21029] R13: 00007f33b0310700 R14: 0000000000000001 R15: 000000000075bfd4 [ 419.084583][T21029] memory: usage 8456kB, limit 0kB, failcnt 48 [ 419.111491][T21029] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 419.140160][T21029] Memory cgroup stats for /syz3: [ 419.140268][T21029] anon 2146304 [ 419.140268][T21029] file 208896 [ 419.140268][T21029] kernel_stack 0 [ 419.140268][T21029] slab 6242304 [ 419.140268][T21029] sock 0 [ 419.140268][T21029] shmem 0 [ 419.140268][T21029] file_mapped 0 [ 419.140268][T21029] file_dirty 135168 [ 419.140268][T21029] file_writeback 0 [ 419.140268][T21029] anon_thp 2097152 [ 419.140268][T21029] inactive_anon 0 [ 419.140268][T21029] active_anon 2146304 [ 419.140268][T21029] inactive_file 135168 [ 419.140268][T21029] active_file 0 [ 419.140268][T21029] unevictable 0 [ 419.140268][T21029] slab_reclaimable 3649536 [ 419.140268][T21029] slab_unreclaimable 2592768 [ 419.140268][T21029] pgfault 35772 [ 419.140268][T21029] pgmajfault 0 [ 419.140268][T21029] workingset_refault 0 [ 419.140268][T21029] workingset_activate 0 [ 419.140268][T21029] workingset_nodereclaim 0 [ 419.140268][T21029] pgrefill 0 [ 419.140268][T21029] pgscan 0 [ 419.140268][T21029] pgsteal 0 [ 419.140268][T21029] pgactivate 0 [ 419.237003][T21029] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=21029,uid=0 [ 419.260658][T21029] Memory cgroup out of memory: Killed process 21029 (syz-executor.3) total-vm:72708kB, anon-rss:2156kB, file-rss:34816kB, shmem-rss:0kB [ 419.288405][ T1058] oom_reaper: reaped process 21029 (syz-executor.3), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB 00:51:00 executing program 3: socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) mkdirat$cgroup(r4, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000120081f87059ae08060c04000a006b10400103fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) write$cgroup_int(r5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000240)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) 00:51:00 executing program 0: socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) mkdirat$cgroup(r4, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000120081f87059ae08060c04000a006b10400103fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) write$cgroup_int(r5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000240)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) 00:51:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000280)={[{0x0, 'pids'}]}, 0x253) write$cgroup_int(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 00:51:00 executing program 1: socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) mkdirat$cgroup(r4, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000120081f87059ae08060c04000a006b10400103fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) write$cgroup_int(r5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000240)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) [ 419.564773][T19311] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 419.592243][T19311] CPU: 1 PID: 19311 Comm: syz-executor.3 Not tainted 5.3.0-rc3+ #0 [ 419.600188][T19311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.610249][T19311] Call Trace: [ 419.613553][T19311] dump_stack+0x172/0x1f0 [ 419.613576][T19311] dump_header+0x10b/0x82d [ 419.613587][T19311] ? oom_kill_process+0x94/0x3f0 [ 419.613605][T19311] oom_kill_process.cold+0x10/0x15 [ 419.622422][T19311] out_of_memory+0x79a/0x12c0 [ 419.622441][T19311] ? lock_downgrade+0x920/0x920 [ 419.622456][T19311] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 419.622475][T19311] ? oom_killer_disable+0x280/0x280 [ 419.637306][T19311] mem_cgroup_out_of_memory+0x1d8/0x240 [ 419.647930][T19311] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 419.664281][T19311] ? do_raw_spin_unlock+0x57/0x270 [ 419.669425][T19311] ? _raw_spin_unlock+0x2d/0x50 [ 419.674296][T19311] try_charge+0xf4b/0x1440 [ 419.678744][T19311] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 419.684309][T19311] ? find_held_lock+0x35/0x130 [ 419.689087][T19311] ? get_mem_cgroup_from_mm+0x139/0x320 [ 419.694659][T19311] ? lock_downgrade+0x920/0x920 [ 419.699525][T19311] ? percpu_ref_tryget_live+0x111/0x290 [ 419.705091][T19311] __memcg_kmem_charge_memcg+0x71/0xf0 [ 419.710563][T19311] ? memcg_kmem_put_cache+0x50/0x50 [ 419.715775][T19311] ? get_mem_cgroup_from_mm+0x156/0x320 [ 419.721333][T19311] __memcg_kmem_charge+0x13a/0x3a0 [ 419.726456][T19311] __alloc_pages_nodemask+0x4f4/0x900 [ 419.731995][T19311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.738254][T19311] ? __alloc_pages_slowpath+0x2520/0x2520 [ 419.743985][T19311] ? copy_process+0x46d1/0x6b00 [ 419.748856][T19311] ? lockdep_hardirqs_on+0x418/0x5d0 [ 419.754234][T19311] ? trace_hardirqs_on+0x67/0x240 [ 419.759262][T19311] ? __kasan_check_read+0x11/0x20 [ 419.764308][T19311] copy_process+0x3f8/0x6b00 [ 419.768909][T19311] ? __kasan_check_read+0x11/0x20 [ 419.773942][T19311] ? __lock_acquire+0x1702/0x4c30 [ 419.778974][T19311] ? __kasan_check_read+0x11/0x20 [ 419.784181][T19311] ? mark_lock+0xc0/0x11e0 [ 419.788609][T19311] ? __cleanup_sighand+0x60/0x60 [ 419.793898][T19311] ? find_held_lock+0x35/0x130 [ 419.798692][T19311] _do_fork+0x146/0xfa0 [ 419.802888][T19311] ? copy_init_mm+0x20/0x20 [ 419.807436][T19311] ? __kasan_check_read+0x11/0x20 [ 419.812558][T19311] ? _copy_to_user+0x118/0x160 [ 419.817340][T19311] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 419.823592][T19311] ? put_timespec64+0xda/0x140 [ 419.828378][T19311] __x64_sys_clone+0x18d/0x250 [ 419.833241][T19311] ? __ia32_sys_vfork+0xc0/0xc0 [ 419.838139][T19311] ? lockdep_hardirqs_on+0x418/0x5d0 [ 419.843437][T19311] ? trace_hardirqs_on+0x67/0x240 [ 419.848474][T19311] do_syscall_64+0xfd/0x6a0 [ 419.853167][T19311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.859061][T19311] RIP: 0033:0x457e4a [ 419.862957][T19311] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 419.882566][T19311] RSP: 002b:00007ffda27c4c00 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 419.890982][T19311] RAX: ffffffffffffffda RBX: 00007ffda27c4c00 RCX: 0000000000457e4a [ 419.899069][T19311] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 419.907044][T19311] RBP: 00007ffda27c4c40 R08: 0000000000000001 R09: 0000555557259940 00:51:01 executing program 5: socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) mkdirat$cgroup(r4, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000120081f87059ae08060c04000a006b10400103fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) write$cgroup_int(r5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000240)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) [ 419.915021][T19311] R10: 0000555557259c10 R11: 0000000000000246 R12: 0000000000000001 [ 419.923024][T19311] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffda27c4c90 [ 419.966521][T19311] memory: usage 5940kB, limit 0kB, failcnt 57 [ 419.972712][T19311] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 419.984421][T19311] Memory cgroup stats for /syz3: [ 419.985567][T19311] anon 0 [ 419.985567][T19311] file 208896 [ 419.985567][T19311] kernel_stack 0 [ 419.985567][T19311] slab 5971968 [ 419.985567][T19311] sock 0 [ 419.985567][T19311] shmem 0 [ 419.985567][T19311] file_mapped 0 [ 419.985567][T19311] file_dirty 135168 [ 419.985567][T19311] file_writeback 0 [ 419.985567][T19311] anon_thp 0 [ 419.985567][T19311] inactive_anon 0 [ 419.985567][T19311] active_anon 0 [ 419.985567][T19311] inactive_file 135168 [ 419.985567][T19311] active_file 0 [ 419.985567][T19311] unevictable 0 [ 419.985567][T19311] slab_reclaimable 3514368 [ 419.985567][T19311] slab_unreclaimable 2457600 [ 419.985567][T19311] pgfault 35772 [ 419.985567][T19311] pgmajfault 0 [ 419.985567][T19311] workingset_refault 0 [ 419.985567][T19311] workingset_activate 0 [ 419.985567][T19311] workingset_nodereclaim 0 00:51:01 executing program 5: socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) mkdirat$cgroup(r4, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000120081f87059ae08060c04000a006b10400103fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) write$cgroup_int(r5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000240)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) 00:51:01 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) close(r2) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$TUNSETCARRIER(r1, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)={0x2, 0x0, [0x0, 0x0]}) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') [ 419.985567][T19311] pgrefill 0 [ 419.985567][T19311] pgscan 0 [ 419.985567][T19311] pgsteal 0 [ 419.985567][T19311] pgactivate 0 [ 420.080559][T19311] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=19311,uid=0 00:51:01 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x2}) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) close(r0) [ 420.143297][T19311] Memory cgroup out of memory: Killed process 19311 (syz-executor.3) total-vm:72444kB, anon-rss:108kB, file-rss:35776kB, shmem-rss:0kB [ 420.214946][ T1058] oom_reaper: reaped process 19311 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 420.241248][T21048] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 420.264792][T21048] CPU: 1 PID: 21048 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #0 [ 420.272746][T21048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.282805][T21048] Call Trace: [ 420.286111][T21048] dump_stack+0x172/0x1f0 [ 420.290462][T21048] dump_header+0x10b/0x82d [ 420.294886][T21048] ? oom_kill_process+0x94/0x3f0 [ 420.299862][T21048] oom_kill_process.cold+0x10/0x15 [ 420.304995][T21048] out_of_memory+0x79a/0x12c0 [ 420.309690][T21048] ? lock_downgrade+0x920/0x920 [ 420.314550][T21048] ? oom_killer_disable+0x280/0x280 [ 420.319771][T21048] mem_cgroup_out_of_memory+0x1d8/0x240 [ 420.325319][T21048] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 420.330965][T21048] ? do_raw_spin_unlock+0x57/0x270 [ 420.336078][T21048] ? _raw_spin_unlock+0x2d/0x50 [ 420.340932][T21048] try_charge+0xf4b/0x1440 [ 420.345356][T21048] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 420.350984][T21048] ? percpu_ref_tryget_live+0x111/0x290 [ 420.356546][T21048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 420.362885][T21048] ? __kasan_check_read+0x11/0x20 [ 420.367919][T21048] ? get_mem_cgroup_from_mm+0x156/0x320 [ 420.373471][T21048] mem_cgroup_try_charge+0x136/0x590 [ 420.378772][T21048] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 420.384412][T21048] __handle_mm_fault+0x1e3a/0x3f20 [ 420.389529][T21048] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 420.395093][T21048] ? __kasan_check_read+0x11/0x20 [ 420.400222][T21048] handle_mm_fault+0x1b5/0x6b0 [ 420.404995][T21048] __do_page_fault+0x536/0xdd0 [ 420.410037][T21048] do_page_fault+0x38/0x590 [ 420.414546][T21048] page_fault+0x39/0x40 [ 420.418699][T21048] RIP: 0033:0x4111bf [ 420.422609][T21048] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 420.442208][T21048] RSP: 002b:00007ffeaf6de5b0 EFLAGS: 00010206 [ 420.448281][T21048] RAX: 00007f5a36865000 RBX: 0000000000020000 RCX: 00000000004598ca [ 420.456254][T21048] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 420.464223][T21048] RBP: 00007ffeaf6de690 R08: ffffffffffffffff R09: 0000000000000000 [ 420.472205][T21048] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffeaf6de780 [ 420.480187][T21048] R13: 00007f5a36885700 R14: 0000000000000001 R15: 000000000075bfd4 [ 420.489474][T21048] memory: usage 6540kB, limit 0kB, failcnt 8 [ 420.495749][T21048] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 420.502808][T21048] Memory cgroup stats for [ 420.502817][T21048] /syz1: [ 420.502922][T21048] anon 2375680 [ 420.502922][T21048] file 126976 [ 420.502922][T21048] kernel_stack 65536 [ 420.502922][T21048] slab 4071424 [ 420.502922][T21048] sock 0 [ 420.502922][T21048] shmem 36864 [ 420.502922][T21048] file_mapped 0 [ 420.502922][T21048] file_dirty 0 [ 420.502922][T21048] file_writeback 0 [ 420.502922][T21048] anon_thp 2097152 [ 420.502922][T21048] inactive_anon 0 [ 420.502922][T21048] active_anon 2301952 [ 420.502922][T21048] inactive_file 0 [ 420.502922][T21048] active_file 135168 [ 420.502922][T21048] unevictable 0 [ 420.502922][T21048] slab_reclaimable 1757184 [ 420.502922][T21048] slab_unreclaimable 2314240 [ 420.502922][T21048] pgfault 38214 [ 420.502922][T21048] pgmajfault 0 [ 420.502922][T21048] workingset_refault 0 [ 420.502922][T21048] workingset_activate 0 [ 420.502922][T21048] workingset_nodereclaim 0 [ 420.502922][T21048] pgrefill 34 [ 420.502922][T21048] pgscan 0 [ 420.502922][T21048] pgsteal 0 [ 420.502922][T21048] pgactivate 0 [ 420.602612][T21048] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=21048,uid=0 [ 420.619550][T21048] Memory cgroup out of memory: Killed process 21048 (syz-executor.1) total-vm:72708kB, anon-rss:2148kB, file-rss:34816kB, shmem-rss:0kB [ 420.651006][ T1058] oom_reaper: reaped process 21048 (syz-executor.1), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB [ 420.663087][T21045] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 420.675552][T21045] CPU: 1 PID: 21045 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #0 [ 420.683468][T21045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.683475][T21045] Call Trace: [ 420.683498][T21045] dump_stack+0x172/0x1f0 [ 420.683524][T21045] dump_header+0x10b/0x82d [ 420.705557][T21045] ? oom_kill_process+0x94/0x3f0 [ 420.710483][T21045] oom_kill_process.cold+0x10/0x15 [ 420.715580][T21045] out_of_memory+0x79a/0x12c0 [ 420.720268][T21045] ? lock_downgrade+0x920/0x920 [ 420.725112][T21045] ? oom_killer_disable+0x280/0x280 [ 420.730316][T21045] mem_cgroup_out_of_memory+0x1d8/0x240 [ 420.735864][T21045] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 420.741486][T21045] ? do_raw_spin_unlock+0x57/0x270 [ 420.746584][T21045] ? _raw_spin_unlock+0x2d/0x50 [ 420.751425][T21045] try_charge+0xf4b/0x1440 [ 420.755832][T21045] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 420.761368][T21045] ? percpu_ref_tryget_live+0x111/0x290 [ 420.766900][T21045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 420.773133][T21045] ? __kasan_check_read+0x11/0x20 [ 420.778152][T21045] ? get_mem_cgroup_from_mm+0x156/0x320 [ 420.783686][T21045] mem_cgroup_try_charge+0x136/0x590 [ 420.788959][T21045] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 420.794591][T21045] __handle_mm_fault+0x1e3a/0x3f20 [ 420.799705][T21045] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 420.805245][T21045] ? __kasan_check_read+0x11/0x20 [ 420.810271][T21045] handle_mm_fault+0x1b5/0x6b0 [ 420.815024][T21045] __do_page_fault+0x536/0xdd0 [ 420.819777][T21045] do_page_fault+0x38/0x590 [ 420.824269][T21045] page_fault+0x39/0x40 [ 420.828506][T21045] RIP: 0033:0x4111bf [ 420.832383][T21045] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 420.851974][T21045] RSP: 002b:00007fff8963cf10 EFLAGS: 00010206 [ 420.858025][T21045] RAX: 00007f08ca1e9000 RBX: 0000000000020000 RCX: 00000000004598ca [ 420.865977][T21045] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 420.873930][T21045] RBP: 00007fff8963cff0 R08: ffffffffffffffff R09: 0000000000000000 [ 420.881890][T21045] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff8963d0e0 [ 420.889851][T21045] R13: 00007f08ca209700 R14: 0000000000000001 R15: 000000000075bfd4 00:51:02 executing program 1: socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) mkdirat$cgroup(r4, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000120081f87059ae08060c04000a006b10400103fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) write$cgroup_int(r5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000240)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) [ 420.913110][T21045] memory: usage 8468kB, limit 0kB, failcnt 8 [ 420.943532][T21045] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 420.959869][T21045] Memory cgroup stats for /syz0: [ 420.959975][T21045] anon 2162688 [ 420.959975][T21045] file 540672 [ 420.959975][T21045] kernel_stack 65536 [ 420.959975][T21045] slab 5693440 [ 420.959975][T21045] sock 0 [ 420.959975][T21045] shmem 348160 [ 420.959975][T21045] file_mapped 0 [ 420.959975][T21045] file_dirty 0 [ 420.959975][T21045] file_writeback 0 [ 420.959975][T21045] anon_thp 2097152 [ 420.959975][T21045] inactive_anon 540672 [ 420.959975][T21045] active_anon 2162688 [ 420.959975][T21045] inactive_file 135168 [ 420.959975][T21045] active_file 0 [ 420.959975][T21045] unevictable 0 [ 420.959975][T21045] slab_reclaimable 3514368 [ 420.959975][T21045] slab_unreclaimable 2179072 [ 420.959975][T21045] pgfault 37422 [ 420.959975][T21045] pgmajfault 0 [ 420.959975][T21045] workingset_refault 0 [ 420.959975][T21045] workingset_activate 0 [ 420.959975][T21045] workingset_nodereclaim 0 [ 420.959975][T21045] pgrefill 0 [ 420.959975][T21045] pgscan 0 [ 420.959975][T21045] pgsteal 0 [ 420.959975][T21045] pgactivate 0 [ 421.075406][T21045] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=21045,uid=0 [ 421.092619][T21045] Memory cgroup out of memory: Killed process 21045 (syz-executor.0) total-vm:72708kB, anon-rss:2160kB, file-rss:34816kB, shmem-rss:0kB [ 421.108326][ T1058] oom_reaper: reaped process 21045 (syz-executor.0), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB [ 421.119716][ T8773] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 421.132003][ T8773] CPU: 1 PID: 8773 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #0 [ 421.139817][ T8773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.149887][ T8773] Call Trace: [ 421.153191][ T8773] dump_stack+0x172/0x1f0 [ 421.157519][ T8773] dump_header+0x10b/0x82d [ 421.161923][ T8773] ? oom_kill_process+0x94/0x3f0 [ 421.166846][ T8773] oom_kill_process.cold+0x10/0x15 [ 421.171942][ T8773] out_of_memory+0x79a/0x12c0 [ 421.176606][ T8773] ? lock_downgrade+0x920/0x920 [ 421.181445][ T8773] ? oom_killer_disable+0x280/0x280 [ 421.186685][ T8773] mem_cgroup_out_of_memory+0x1d8/0x240 [ 421.192311][ T8773] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 421.197942][ T8773] ? do_raw_spin_unlock+0x57/0x270 [ 421.203479][ T8773] ? _raw_spin_unlock+0x2d/0x50 [ 421.208364][ T8773] try_charge+0xf4b/0x1440 [ 421.212789][ T8773] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 421.218323][ T8773] ? find_held_lock+0x35/0x130 [ 421.223084][ T8773] ? get_mem_cgroup_from_mm+0x139/0x320 [ 421.228621][ T8773] ? lock_downgrade+0x920/0x920 [ 421.233455][ T8773] ? percpu_ref_tryget_live+0x111/0x290 [ 421.238989][ T8773] __memcg_kmem_charge_memcg+0x71/0xf0 [ 421.244434][ T8773] ? memcg_kmem_put_cache+0x50/0x50 [ 421.249617][ T8773] ? get_mem_cgroup_from_mm+0x156/0x320 [ 421.255158][ T8773] __memcg_kmem_charge+0x13a/0x3a0 [ 421.260343][ T8773] __alloc_pages_nodemask+0x4f4/0x900 [ 421.265699][ T8773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 421.272015][ T8773] ? __alloc_pages_slowpath+0x2520/0x2520 [ 421.277730][ T8773] ? copy_process+0x46d1/0x6b00 [ 421.282571][ T8773] ? lockdep_hardirqs_on+0x418/0x5d0 [ 421.287840][ T8773] ? trace_hardirqs_on+0x67/0x240 [ 421.292847][ T8773] ? __kasan_check_read+0x11/0x20 [ 421.297881][ T8773] copy_process+0x3f8/0x6b00 [ 421.302462][ T8773] ? __kasan_check_read+0x11/0x20 [ 421.307472][ T8773] ? __lock_acquire+0x1702/0x4c30 [ 421.312479][ T8773] ? __kasan_check_read+0x11/0x20 [ 421.317489][ T8773] ? mark_lock+0xc0/0x11e0 [ 421.321907][ T8773] ? __cleanup_sighand+0x60/0x60 [ 421.326836][ T8773] ? find_held_lock+0x35/0x130 [ 421.331595][ T8773] _do_fork+0x146/0xfa0 [ 421.335742][ T8773] ? copy_init_mm+0x20/0x20 [ 421.340232][ T8773] ? __kasan_check_read+0x11/0x20 [ 421.345244][ T8773] ? _copy_to_user+0x118/0x160 [ 421.349992][ T8773] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 421.356214][ T8773] ? put_timespec64+0xda/0x140 [ 421.360979][ T8773] __x64_sys_clone+0x18d/0x250 [ 421.365733][ T8773] ? __ia32_sys_vfork+0xc0/0xc0 [ 421.370576][ T8773] ? lockdep_hardirqs_on+0x418/0x5d0 [ 421.375844][ T8773] ? trace_hardirqs_on+0x67/0x240 [ 421.380858][ T8773] do_syscall_64+0xfd/0x6a0 [ 421.385350][ T8773] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 421.391235][ T8773] RIP: 0033:0x457e4a [ 421.395118][ T8773] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 421.414722][ T8773] RSP: 002b:00007ffeaf6de800 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 421.423119][ T8773] RAX: ffffffffffffffda RBX: 00007ffeaf6de800 RCX: 0000000000457e4a [ 421.431076][ T8773] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 00:51:02 executing program 0: socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) mkdirat$cgroup(r4, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000120081f87059ae08060c04000a006b10400103fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) write$cgroup_int(r5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000240)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) [ 421.439029][ T8773] RBP: 00007ffeaf6de840 R08: 0000000000000001 R09: 0000555555650940 [ 421.446980][ T8773] R10: 0000555555650c10 R11: 0000000000000246 R12: 0000000000000001 [ 421.454933][ T8773] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffeaf6de890 [ 421.477954][ T8773] memory: usage 4192kB, limit 0kB, failcnt 17 [ 421.484179][ T8773] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 421.498747][ T8773] Memory cgroup stats for /syz1: [ 421.498848][ T8773] anon 77824 [ 421.498848][ T8773] file 126976 [ 421.498848][ T8773] kernel_stack 0 [ 421.498848][ T8773] slab 4071424 [ 421.498848][ T8773] sock 0 [ 421.498848][ T8773] shmem 36864 [ 421.498848][ T8773] file_mapped 0 [ 421.498848][ T8773] file_dirty 0 [ 421.498848][ T8773] file_writeback 0 [ 421.498848][ T8773] anon_thp 0 [ 421.498848][ T8773] inactive_anon 0 [ 421.498848][ T8773] active_anon 77824 [ 421.498848][ T8773] inactive_file 0 [ 421.498848][ T8773] active_file 135168 [ 421.498848][ T8773] unevictable 0 [ 421.498848][ T8773] slab_reclaimable 1757184 [ 421.498848][ T8773] slab_unreclaimable 2314240 [ 421.498848][ T8773] pgfault 38214 [ 421.498848][ T8773] pgmajfault 0 [ 421.498848][ T8773] workingset_refault 0 [ 421.498848][ T8773] workingset_activate 0 [ 421.498848][ T8773] workingset_nodereclaim 0 [ 421.498848][ T8773] pgrefill 34 [ 421.498848][ T8773] pgscan 0 [ 421.498848][ T8773] pgsteal 0 [ 421.498848][ T8773] pgactivate 0 [ 421.630767][ T8773] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=8773,uid=0 [ 421.646397][ T8773] Memory cgroup out of memory: Killed process 8773 (syz-executor.1) total-vm:72444kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB [ 421.660775][ T8770] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 421.664969][ T1058] oom_reaper: reaped process 8773 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 421.673308][ T8770] CPU: 1 PID: 8770 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #0 [ 421.691435][ T8770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.701488][ T8770] Call Trace: [ 421.704787][ T8770] dump_stack+0x172/0x1f0 [ 421.709122][ T8770] dump_header+0x10b/0x82d [ 421.713531][ T8770] ? oom_kill_process+0x94/0x3f0 [ 421.718470][ T8770] oom_kill_process.cold+0x10/0x15 [ 421.723587][ T8770] out_of_memory+0x79a/0x12c0 [ 421.728438][ T8770] ? lock_downgrade+0x920/0x920 [ 421.733294][ T8770] ? oom_killer_disable+0x280/0x280 [ 421.738508][ T8770] mem_cgroup_out_of_memory+0x1d8/0x240 [ 421.745098][ T8770] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 421.750741][ T8770] ? do_raw_spin_unlock+0x57/0x270 [ 421.755851][ T8770] ? _raw_spin_unlock+0x2d/0x50 [ 421.760701][ T8770] try_charge+0xf4b/0x1440 [ 421.765124][ T8770] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 421.770665][ T8770] ? find_held_lock+0x35/0x130 [ 421.775428][ T8770] ? get_mem_cgroup_from_mm+0x139/0x320 [ 421.780987][ T8770] ? lock_downgrade+0x920/0x920 [ 421.785860][ T8770] ? percpu_ref_tryget_live+0x111/0x290 [ 421.791409][ T8770] __memcg_kmem_charge_memcg+0x71/0xf0 [ 421.796960][ T8770] ? memcg_kmem_put_cache+0x50/0x50 [ 421.802163][ T8770] ? get_mem_cgroup_from_mm+0x156/0x320 [ 421.807713][ T8770] __memcg_kmem_charge+0x13a/0x3a0 [ 421.812826][ T8770] __alloc_pages_nodemask+0x4f4/0x900 [ 421.818211][ T8770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 421.824471][ T8770] ? __alloc_pages_slowpath+0x2520/0x2520 [ 421.830187][ T8770] ? copy_process+0x46d1/0x6b00 [ 421.835058][ T8770] ? lockdep_hardirqs_on+0x418/0x5d0 [ 421.840352][ T8770] ? trace_hardirqs_on+0x67/0x240 [ 421.845384][ T8770] ? __kasan_check_read+0x11/0x20 [ 421.850423][ T8770] copy_process+0x3f8/0x6b00 [ 421.855021][ T8770] ? __kasan_check_read+0x11/0x20 [ 421.860065][ T8770] ? __lock_acquire+0x1702/0x4c30 [ 421.865098][ T8770] ? __kasan_check_read+0x11/0x20 [ 421.870126][ T8770] ? mark_lock+0xc0/0x11e0 [ 421.874557][ T8770] ? __cleanup_sighand+0x60/0x60 [ 421.879500][ T8770] ? find_held_lock+0x35/0x130 [ 421.884284][ T8770] _do_fork+0x146/0xfa0 [ 421.888451][ T8770] ? copy_init_mm+0x20/0x20 [ 421.892967][ T8770] ? __kasan_check_read+0x11/0x20 [ 421.897996][ T8770] ? _copy_to_user+0x118/0x160 [ 421.902772][ T8770] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 421.909027][ T8770] ? put_timespec64+0xda/0x140 [ 421.913826][ T8770] __x64_sys_clone+0x18d/0x250 [ 421.918592][ T8770] ? __ia32_sys_vfork+0xc0/0xc0 [ 421.923446][ T8770] ? lockdep_hardirqs_on+0x418/0x5d0 [ 421.928878][ T8770] ? trace_hardirqs_on+0x67/0x240 [ 421.934009][ T8770] do_syscall_64+0xfd/0x6a0 [ 421.938530][ T8770] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 421.944408][ T8770] RIP: 0033:0x457e4a [ 421.948297][ T8770] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 421.967896][ T8770] RSP: 002b:00007fff8963d160 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 421.976302][ T8770] RAX: ffffffffffffffda RBX: 00007fff8963d160 RCX: 0000000000457e4a [ 421.984261][ T8770] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 421.992224][ T8770] RBP: 00007fff8963d1a0 R08: 0000000000000001 R09: 0000555556ff7940 [ 422.000195][ T8770] R10: 0000555556ff7c10 R11: 0000000000000246 R12: 0000000000000001 [ 422.008149][ T8770] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff8963d1f0 [ 422.017773][ T8770] memory: usage 6116kB, limit 0kB, failcnt 17 [ 422.023971][ T8770] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 422.031142][ T8770] Memory cgroup stats for /syz0: [ 422.031251][ T8770] anon 0 [ 422.031251][ T8770] file 540672 [ 422.031251][ T8770] kernel_stack 65536 [ 422.031251][ T8770] slab 5693440 [ 422.031251][ T8770] sock 0 [ 422.031251][ T8770] shmem 348160 [ 422.031251][ T8770] file_mapped 0 [ 422.031251][ T8770] file_dirty 0 [ 422.031251][ T8770] file_writeback 0 [ 422.031251][ T8770] anon_thp 0 [ 422.031251][ T8770] inactive_anon 540672 [ 422.031251][ T8770] active_anon 0 [ 422.031251][ T8770] inactive_file 135168 [ 422.031251][ T8770] active_file 0 [ 422.031251][ T8770] unevictable 0 [ 422.031251][ T8770] slab_reclaimable 3514368 [ 422.031251][ T8770] slab_unreclaimable 2179072 [ 422.031251][ T8770] pgfault 37422 [ 422.031251][ T8770] pgmajfault 0 [ 422.031251][ T8770] workingset_refault 0 [ 422.031251][ T8770] workingset_activate 0 [ 422.031251][ T8770] workingset_nodereclaim 0 [ 422.031251][ T8770] pgrefill 0 [ 422.031251][ T8770] pgscan 0 [ 422.031251][ T8770] pgsteal 0 [ 422.031251][ T8770] pgactivate 0 [ 422.125774][ T8770] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8770,uid=0 [ 422.141837][ T8770] Memory cgroup out of memory: Killed process 8770 (syz-executor.0) total-vm:72444kB, anon-rss:112kB, file-rss:35776kB, shmem-rss:0kB 00:51:03 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) close(r2) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$TUNSETCARRIER(r1, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)={0x2, 0x0, [0x0, 0x0]}) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') [ 422.240001][T21067] IPVS: ftp: loaded support on port[0] = 21 00:51:03 executing program 3: socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) mkdirat$cgroup(r4, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000120081f87059ae08060c04000a006b10400103fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) write$cgroup_int(r5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000240)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) 00:51:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x4}]}]}}, &(0x7f0000000100)=""/212, 0x2e, 0xd4, 0x1}, 0x20) 00:51:03 executing program 0: socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) mkdirat$cgroup(r4, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000120081f87059ae08060c04000a006b10400103fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) write$cgroup_int(r5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000240)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) 00:51:03 executing program 1: socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) mkdirat$cgroup(r4, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000120081f87059ae08060c04000a006b10400103fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) write$cgroup_int(r5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000240)) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) [ 422.711161][T21071] device wlan0 entered promiscuous mode 00:51:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x4}]}]}}, &(0x7f0000000100)=""/212, 0x2e, 0xd4, 0x1}, 0x20) 00:51:03 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'.o\x00\x00\x02\x00\x02\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xffffffffffffffff}) socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, &(0x7f0000000040)=r0, 0x52d) [ 423.211272][T21067] chnl_net:caif_netlink_parms(): no params data found [ 423.308180][T21067] bridge0: port 1(bridge_slave_0) entered blocking state [ 423.315420][T21067] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.323130][T21067] device bridge_slave_0 entered promiscuous mode [ 423.399597][T21067] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.406952][T21067] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.414910][T21067] device bridge_slave_1 entered promiscuous mode [ 423.500624][T21067] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 423.512217][T21067] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 423.538869][T21067] team0: Port device team_slave_0 added [ 423.546030][T21067] team0: Port device team_slave_1 added [ 423.666301][T21067] device hsr_slave_0 entered promiscuous mode [ 423.718416][T21067] device hsr_slave_1 entered promiscuous mode [ 423.784463][T21067] debugfs: Directory 'hsr0' with parent '/' already present! [ 423.867983][T21067] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.875080][T21067] bridge0: port 2(bridge_slave_1) entered forwarding state [ 423.882366][T21067] bridge0: port 1(bridge_slave_0) entered blocking state [ 423.889464][T21067] bridge0: port 1(bridge_slave_0) entered forwarding state [ 423.906074][ T7] device bridge_slave_1 left promiscuous mode [ 423.912309][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.945287][ T7] device bridge_slave_0 left promiscuous mode [ 423.951480][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.934947][ T7] device hsr_slave_0 left promiscuous mode [ 425.974597][ T7] device hsr_slave_1 left promiscuous mode [ 426.026941][ T7] team0 (unregistering): Port device team_slave_1 removed [ 426.041928][ T7] team0 (unregistering): Port device team_slave_0 removed [ 426.060907][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 426.108572][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 426.192945][ T7] bond0 (unregistering): Released all slaves [ 426.296428][T12197] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.297094][T21082] IPVS: ftp: loaded support on port[0] = 21 [ 426.309652][T12197] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.374244][T21067] 8021q: adding VLAN 0 to HW filter on device bond0 [ 426.398322][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 426.406756][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 426.417649][T21067] 8021q: adding VLAN 0 to HW filter on device team0 [ 426.455071][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 426.468312][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 426.477204][T12197] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.484439][T12197] bridge0: port 1(bridge_slave_0) entered forwarding state [ 426.509978][T21082] chnl_net:caif_netlink_parms(): no params data found [ 426.520751][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 426.530829][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 426.541642][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.548753][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 426.557648][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 426.566730][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 426.575679][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 426.584404][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 426.592774][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 426.601677][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 426.660421][T21067] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 426.677458][T21067] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 426.700464][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 426.712369][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 426.724174][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 426.740418][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 426.749360][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 426.782983][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 426.807777][T21082] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.815234][T21082] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.823384][T21082] device bridge_slave_0 entered promiscuous mode [ 426.835165][T21067] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 426.842864][T21082] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.850983][T21082] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.859470][T21082] device bridge_slave_1 entered promiscuous mode [ 426.895504][T21082] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 426.915314][T21082] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 426.950878][T21082] team0: Port device team_slave_0 added [ 426.966365][T21082] team0: Port device team_slave_1 added [ 427.037747][T21082] device hsr_slave_0 entered promiscuous mode [ 427.075148][T21082] device hsr_slave_1 entered promiscuous mode [ 427.124378][T21082] debugfs: Directory 'hsr0' with parent '/' already present! [ 427.160421][T21082] bridge0: port 2(bridge_slave_1) entered blocking state [ 427.167588][T21082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 427.172619][T21090] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 427.175006][T21082] bridge0: port 1(bridge_slave_0) entered blocking state [ 427.175182][T21082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 427.212227][T21090] CPU: 1 PID: 21090 Comm: syz-executor.5 Not tainted 5.3.0-rc3+ #0 [ 427.220168][T21090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.230227][T21090] Call Trace: [ 427.233520][T21090] dump_stack+0x172/0x1f0 [ 427.237869][T21090] dump_header+0x10b/0x82d [ 427.242302][T21090] oom_kill_process.cold+0x10/0x15 [ 427.247429][T21090] out_of_memory+0x79a/0x12c0 [ 427.252110][T21090] ? __sched_text_start+0x8/0x8 [ 427.256967][T21090] ? oom_killer_disable+0x280/0x280 [ 427.259033][T21082] 8021q: adding VLAN 0 to HW filter on device bond0 [ 427.262183][T21090] mem_cgroup_out_of_memory+0x1d8/0x240 [ 427.274271][T21090] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 427.279912][T21090] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 427.285721][T21090] ? cgroup_file_notify+0x140/0x1b0 [ 427.290936][T21090] memory_max_write+0x262/0x3a0 [ 427.291743][T18533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 427.295793][T21090] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 427.295810][T21090] ? lock_acquire+0x20b/0x410 [ 427.295834][T21090] cgroup_file_write+0x241/0x790 [ 427.295855][T21090] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 427.326194][T21090] ? cgroup_migrate_add_task+0x890/0x890 [ 427.331832][T21090] ? cgroup_migrate_add_task+0x890/0x890 [ 427.337470][T21090] kernfs_fop_write+0x2b8/0x480 [ 427.342324][T21090] __vfs_write+0x8a/0x110 [ 427.346649][T21090] ? kernfs_fop_open+0xd80/0xd80 [ 427.351590][T21090] vfs_write+0x268/0x5d0 [ 427.355840][T21090] ksys_write+0x14f/0x290 [ 427.360169][T21090] ? __ia32_sys_read+0xb0/0xb0 [ 427.364932][T21090] ? do_syscall_64+0x26/0x6a0 [ 427.369605][T21090] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.375670][T21090] ? do_syscall_64+0x26/0x6a0 [ 427.380352][T21090] __x64_sys_write+0x73/0xb0 [ 427.384941][T21090] do_syscall_64+0xfd/0x6a0 [ 427.389444][T21090] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.395329][T21090] RIP: 0033:0x459879 [ 427.399223][T21090] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 427.418824][T21090] RSP: 002b:00007f9a455a5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 427.427317][T21090] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459879 [ 427.435281][T21090] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 427.443245][T21090] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 427.451211][T21090] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9a455a66d4 [ 427.459179][T21090] R13: 00000000004c9a03 R14: 00000000004e10c8 R15: 00000000ffffffff [ 427.477334][T21090] memory: usage 6628kB, limit 0kB, failcnt 39 [ 427.483651][T21090] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 427.491867][T18533] bridge0: port 1(bridge_slave_0) entered disabled state [ 427.500080][T21090] Memory cgroup stats for /syz5: [ 427.500635][T21090] anon 2289664 [ 427.500635][T21090] file 122880 [ 427.500635][T21090] kernel_stack 0 [ 427.500635][T21090] slab 4366336 [ 427.500635][T21090] sock 135168 [ 427.500635][T21090] shmem 0 [ 427.500635][T21090] file_mapped 0 [ 427.500635][T21090] file_dirty 135168 [ 427.500635][T21090] file_writeback 0 [ 427.500635][T21090] anon_thp 2097152 [ 427.500635][T21090] inactive_anon 0 [ 427.500635][T21090] active_anon 2220032 [ 427.500635][T21090] inactive_file 0 [ 427.500635][T21090] active_file 0 [ 427.500635][T21090] unevictable 0 [ 427.500635][T21090] slab_reclaimable 1892352 [ 427.500635][T21090] slab_unreclaimable 2473984 [ 427.500635][T21090] pgfault 36762 [ 427.500635][T21090] pgmajfault 0 [ 427.500635][T21090] workingset_refault 0 [ 427.500635][T21090] workingset_activate 0 [ 427.500635][T21090] workingset_nodereclaim 0 [ 427.500635][T21090] pgrefill 0 [ 427.500635][T21090] pgscan 0 [ 427.500635][T21090] pgsteal 0 [ 427.500635][T21090] pgactivate 0 [ 427.598589][T18533] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.612979][T21082] 8021q: adding VLAN 0 to HW filter on device team0 [ 427.635131][T18533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 427.643866][T18533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 427.653620][T18533] bridge0: port 1(bridge_slave_0) entered blocking state [ 427.660737][T18533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 427.669087][T18533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 427.678325][T18533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 427.687198][T18533] bridge0: port 2(bridge_slave_1) entered blocking state [ 427.694261][T18533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 427.702158][T18533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 427.724643][T18533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 427.733392][T18533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 427.739969][T21090] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=21089,uid=0 [ 427.743538][T18533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 427.767545][T18533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 427.776843][T18533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 427.785752][T21090] Memory cgroup out of memory: Killed process 21089 (syz-executor.5) total-vm:72712kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 427.785775][T18533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 427.786340][T18533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 427.823368][ T1058] oom_reaper: reaped process 21089 (syz-executor.5), now anon-rss:0kB, file-rss:34884kB, shmem-rss:0kB [ 427.842780][T18533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 427.851801][T18533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 427.877239][T21082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 427.894453][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 00:51:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x4}]}]}}, &(0x7f0000000100)=""/212, 0x2e, 0xd4, 0x1}, 0x20) 00:51:09 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000006a80)={&(0x7f0000006700)=@can={0x1d, 0x0}, 0x80, &(0x7f00000069c0)=[{0x0}, {&(0x7f0000006880)=""/95, 0x5f}, {0x0}], 0x3, &(0x7f0000006a00)=""/104, 0x68}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000006ac0)='memory.events\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000006b00)={0xf, 0x0, 0x0, 0x80000001, 0x0, 0xffffffffffffffff, 0x0, [], r0, r1, 0x3, 0x4}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000100)={0xffffffffffffff9c}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x4, 0x3, 0x0, 0x0, 0x12, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x8000000000000000}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00, 0x0, 0x0, 0x2000]}, 0x2c) 00:51:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 00:51:09 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) close(r2) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$TUNSETCARRIER(r1, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)={0x2, 0x0, [0x0, 0x0]}) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 00:51:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x90) close(r3) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0xfffff7fffffffffc) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x101, 0x0, 0x4, 0xdeb, 0x0, 0x9, 0x101, 0x7, 0x9, 0xa, 0x3, 0x7, 0xb9, 0x1000, 0x7, 0xe19, 0x0, 0x4, 0x7fffffff, 0x7, 0x9, 0x6000, 0xfffffffffffffffa, 0x1, 0x0, 0x8, 0x7, 0x7, 0x0, 0x4, 0x9, 0x2, 0x6, 0x0, 0x1f, 0x0, 0x0, 0x7fffffff, 0x3, @perf_bp={&(0x7f0000000240), 0x4}, 0x80, 0x0, 0xffffffff, 0x7, 0x8, 0x0, 0x7}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) recvmsg$kcm(r2, &(0x7f00000126c0)={&(0x7f0000011140)=@hci, 0x80, &(0x7f0000011640)=[{0x0}, {&(0x7f0000011340)=""/96, 0x60}, {&(0x7f00000113c0)=""/156, 0x9c}, {0x0}, {&(0x7f0000011500)=""/129, 0x81}, {&(0x7f00000115c0)=""/126, 0x7e}], 0x6, &(0x7f00000116c0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x0, 0x4, 0x0, 0x0, 0x32, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x8}, 0x3c) socket$kcm(0x10, 0x0, 0x4) [ 427.943689][T21082] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 427.971240][T21067] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 428.030017][T21067] CPU: 1 PID: 21067 Comm: syz-executor.5 Not tainted 5.3.0-rc3+ #0 [ 428.037953][T21067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.048007][T21067] Call Trace: [ 428.048028][T21067] dump_stack+0x172/0x1f0 [ 428.048047][T21067] dump_header+0x10b/0x82d [ 428.048058][T21067] ? oom_kill_process+0x94/0x3f0 [ 428.048077][T21067] oom_kill_process.cold+0x10/0x15 [ 428.070105][T21067] out_of_memory+0x79a/0x12c0 [ 428.074787][T21067] ? lock_downgrade+0x920/0x920 [ 428.074804][T21067] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 428.074820][T21067] ? oom_killer_disable+0x280/0x280 [ 428.074844][T21067] mem_cgroup_out_of_memory+0x1d8/0x240 [ 428.096208][T21067] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 428.101859][T21067] ? do_raw_spin_unlock+0x57/0x270 [ 428.106982][T21067] ? _raw_spin_unlock+0x2d/0x50 [ 428.111892][T21067] try_charge+0xf4b/0x1440 [ 428.116331][T21067] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 428.121908][T21067] ? percpu_ref_tryget_live+0x111/0x290 [ 428.127465][T21067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.133718][T21067] ? __kasan_check_read+0x11/0x20 [ 428.138759][T21067] ? get_mem_cgroup_from_mm+0x156/0x320 [ 428.144320][T21067] mem_cgroup_try_charge+0x136/0x590 [ 428.149618][T21067] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 428.155267][T21067] wp_page_copy+0x421/0x15e0 [ 428.159856][T21067] ? find_held_lock+0x35/0x130 [ 428.164619][T21067] ? pmd_pfn+0x1d0/0x1d0 [ 428.168870][T21067] ? lock_downgrade+0x920/0x920 [ 428.173735][T21067] ? swp_swapcount+0x540/0x540 [ 428.178512][T21067] ? __kasan_check_read+0x11/0x20 [ 428.183546][T21067] ? do_raw_spin_unlock+0x57/0x270 [ 428.188667][T21067] do_wp_page+0x499/0x14d0 [ 428.193089][T21067] ? finish_mkwrite_fault+0x570/0x570 [ 428.198496][T21067] __handle_mm_fault+0x22f7/0x3f20 [ 428.203639][T21067] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 428.209209][T21067] ? __kasan_check_read+0x11/0x20 [ 428.214253][T21067] handle_mm_fault+0x1b5/0x6b0 [ 428.219037][T21067] __do_page_fault+0x536/0xdd0 [ 428.223829][T21067] do_page_fault+0x38/0x590 [ 428.228339][T21067] page_fault+0x39/0x40 [ 428.232490][T21067] RIP: 0033:0x430956 [ 428.236390][T21067] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 46 64 00 85 c0 0f 84 [ 428.256008][T21067] RSP: 002b:00007ffd720d46a0 EFLAGS: 00010206 [ 428.262089][T21067] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 428.270068][T21067] RDX: 000055555730c930 RSI: 0000555557314970 RDI: 0000000000000003 [ 428.278051][T21067] RBP: 0000000000008041 R08: 0000000000000001 R09: 000055555730b940 [ 428.286036][T21067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 428.294015][T21067] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 428.338393][T21067] memory: usage 4292kB, limit 0kB, failcnt 48 [ 428.344634][T21067] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 428.351603][T21067] Memory cgroup stats for /syz5: [ 428.351699][T21067] anon 135168 [ 428.351699][T21067] file 122880 [ 428.351699][T21067] kernel_stack 0 [ 428.351699][T21067] slab 4366336 [ 428.351699][T21067] sock 135168 [ 428.351699][T21067] shmem 0 [ 428.351699][T21067] file_mapped 0 [ 428.351699][T21067] file_dirty 135168 [ 428.351699][T21067] file_writeback 0 [ 428.351699][T21067] anon_thp 0 [ 428.351699][T21067] inactive_anon 0 [ 428.351699][T21067] active_anon 65536 [ 428.351699][T21067] inactive_file 0 [ 428.351699][T21067] active_file 0 [ 428.351699][T21067] unevictable 0 [ 428.351699][T21067] slab_reclaimable 1892352 [ 428.351699][T21067] slab_unreclaimable 2473984 [ 428.351699][T21067] pgfault 36762 [ 428.351699][T21067] pgmajfault 0 [ 428.351699][T21067] workingset_refault 0 [ 428.351699][T21067] workingset_activate 0 [ 428.351699][T21067] workingset_nodereclaim 0 [ 428.351699][T21067] pgrefill 0 00:51:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x4}]}]}}, &(0x7f0000000100)=""/212, 0x2e, 0xd4, 0x1}, 0x20) 00:51:09 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'.o\x00\x00\x02\x00\x02\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xffffffffffffffff}) socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, &(0x7f0000000040)=r0, 0x52d) [ 428.351699][T21067] pgscan 0 [ 428.351699][T21067] pgsteal 0 [ 428.351699][T21067] pgactivate 0 [ 428.357077][T21067] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=21067,uid=0 [ 428.519653][T21067] Memory cgroup out of memory: Killed process 21067 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB 00:51:09 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) close(r2) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$TUNSETCARRIER(r1, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)={0x2, 0x0, [0x0, 0x0]}) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 00:51:09 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'.o\x00\x00\x02\x00\x02\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xffffffffffffffff}) socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, &(0x7f0000000040)=r0, 0x52d) 00:51:09 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x6, &(0x7f0000000100), 0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x3b, 0x0, 0x0) 00:51:09 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'.o\x00\x00\x02\x00\x02\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xffffffffffffffff}) socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, &(0x7f0000000040)=r0, 0x52d) 00:51:09 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x6, &(0x7f0000000100), 0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x3b, 0x0, 0x0) 00:51:09 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="0501e0ffffffff287ef7af7cbaabd7eed6b85e7ae2227160"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xffffffffffffffb7) socket$kcm(0x2, 0x3, 0x84) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x3, 0x80007, 0xc4e, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) getpid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000040)="63cee2ec881bdcba676a09f0b8a16f8c67c1c6524d0de5f095cee607e6cc0fc8d73782deb7ee8a464974956127dd3f7c423987860127ce3e4dea9d", 0x0, 0x2}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x1, 0x1, 0x1ff, 0x0, 0x80000000, 0x20000, 0x0, 0x0, 0x5, 0x0, 0x28, 0x20, 0x2, 0x2, 0x8c, 0x400, 0xa, 0xa2, 0x5, 0x2, 0x6, 0x6, 0xe1, 0x8, 0x8, 0x9, 0x81, 0x10000, 0x7bd7, 0x4, 0x7, 0xfffffffffffff9f6, 0x5, 0x8, 0x24, 0x0, 0xbd, 0x0, @perf_config_ext={0x46a, 0x2}, 0x4, 0x1, 0x7, 0x7, 0x2, 0x542d1139, 0xfffffffffffeffff}, r1, 0x9, r1, 0x5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x40000b) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x4) openat$cgroup_ro(r1, &(0x7f00000004c0)='io.stat\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000005c0)={r0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) write$cgroup_pid(r3, &(0x7f0000000000), 0xcbaa60f5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, &(0x7f0000000500)={[{0x2b, 'io'}, {0x2d, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'rdma'}, {0xc7db916e610a8fe0, 'cpu'}, {0x2f, 'cpu'}]}, 0x1f) [ 429.461150][T21138] IPVS: ftp: loaded support on port[0] = 21 [ 429.547485][T21138] chnl_net:caif_netlink_parms(): no params data found [ 429.593708][T21138] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.614394][T21138] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.622576][T21138] device bridge_slave_0 entered promiscuous mode [ 429.639384][T21138] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.651579][T21138] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.662855][T21138] device bridge_slave_1 entered promiscuous mode [ 429.702867][T21138] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 429.722373][T21138] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 429.750292][T21142] IPVS: ftp: loaded support on port[0] = 21 [ 429.763667][T21138] team0: Port device team_slave_0 added [ 429.782678][T21138] team0: Port device team_slave_1 added [ 429.897191][T21138] device hsr_slave_0 entered promiscuous mode [ 429.939044][T21138] device hsr_slave_1 entered promiscuous mode [ 430.014511][T21138] debugfs: Directory 'hsr0' with parent '/' already present! [ 430.090786][T21142] chnl_net:caif_netlink_parms(): no params data found [ 430.132887][T21142] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.140939][T21142] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.153942][T21142] device bridge_slave_0 entered promiscuous mode [ 430.171530][T21142] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.179530][T21142] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.192954][T21142] device bridge_slave_1 entered promiscuous mode [ 430.214797][T21142] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 430.233070][T21142] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 430.261610][T21142] team0: Port device team_slave_0 added [ 430.270196][T21142] team0: Port device team_slave_1 added [ 430.287849][T21138] 8021q: adding VLAN 0 to HW filter on device bond0 [ 430.309390][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 430.321582][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 430.330062][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 430.387702][T21142] device hsr_slave_0 entered promiscuous mode [ 430.424845][T21142] device hsr_slave_1 entered promiscuous mode [ 430.484423][T21142] debugfs: Directory 'hsr0' with parent '/' already present! [ 431.102301][T21138] 8021q: adding VLAN 0 to HW filter on device team0 [ 431.131802][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 431.141436][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 431.150297][T21145] bridge0: port 1(bridge_slave_0) entered blocking state [ 431.157401][T21145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 431.165923][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 431.174796][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 431.183262][T21145] bridge0: port 2(bridge_slave_1) entered blocking state [ 431.190360][T21145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 431.198743][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 431.516320][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 431.526065][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 431.873404][T21138] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 431.884011][T21138] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 431.897770][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 431.907575][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 431.916505][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 431.926736][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 431.935389][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 431.943751][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 431.952381][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 431.960900][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 431.972250][T21142] 8021q: adding VLAN 0 to HW filter on device bond0 [ 432.273322][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 432.281759][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 432.304725][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 432.312455][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 432.327906][T21138] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 432.653014][T21142] 8021q: adding VLAN 0 to HW filter on device team0 [ 432.664666][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 432.673357][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 432.682540][ T8781] bridge0: port 1(bridge_slave_0) entered blocking state [ 432.689683][ T8781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 432.699256][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 433.015572][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 433.026263][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 433.034848][ T8781] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.041926][ T8781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 433.050704][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 00:51:14 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000006a80)={&(0x7f0000006700)=@can={0x1d, 0x0}, 0x80, &(0x7f00000069c0)=[{0x0}, {&(0x7f0000006880)=""/95, 0x5f}, {0x0}], 0x3, &(0x7f0000006a00)=""/104, 0x68}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000006ac0)='memory.events\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000006b00)={0xf, 0x0, 0x0, 0x80000001, 0x0, 0xffffffffffffffff, 0x0, [], r0, r1, 0x3, 0x4}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000100)={0xffffffffffffff9c}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x4, 0x3, 0x0, 0x0, 0x12, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x8000000000000000}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00, 0x0, 0x0, 0x2000]}, 0x2c) [ 433.560610][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 433.570871][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 433.580976][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 433.603261][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 433.612516][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 433.623102][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 433.632020][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 433.640748][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 433.949478][T21142] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 433.962745][T21142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 433.972632][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 433.981463][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 434.289249][T21142] 8021q: adding VLAN 0 to HW filter on device batadv0 00:51:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 00:51:15 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x6, &(0x7f0000000100), 0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x3b, 0x0, 0x0) 00:51:15 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff024}, {0x16}]}) 00:51:15 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="0501e0ffffffff287ef7af7cbaabd7eed6b85e7ae2227160"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xffffffffffffffb7) socket$kcm(0x2, 0x3, 0x84) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x3, 0x80007, 0xc4e, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) getpid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000040)="63cee2ec881bdcba676a09f0b8a16f8c67c1c6524d0de5f095cee607e6cc0fc8d73782deb7ee8a464974956127dd3f7c423987860127ce3e4dea9d", 0x0, 0x2}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x1, 0x1, 0x1ff, 0x0, 0x80000000, 0x20000, 0x0, 0x0, 0x5, 0x0, 0x28, 0x20, 0x2, 0x2, 0x8c, 0x400, 0xa, 0xa2, 0x5, 0x2, 0x6, 0x6, 0xe1, 0x8, 0x8, 0x9, 0x81, 0x10000, 0x7bd7, 0x4, 0x7, 0xfffffffffffff9f6, 0x5, 0x8, 0x24, 0x0, 0xbd, 0x0, @perf_config_ext={0x46a, 0x2}, 0x4, 0x1, 0x7, 0x7, 0x2, 0x542d1139, 0xfffffffffffeffff}, r1, 0x9, r1, 0x5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x40000b) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x4) openat$cgroup_ro(r1, &(0x7f00000004c0)='io.stat\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000005c0)={r0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) write$cgroup_pid(r3, &(0x7f0000000000), 0xcbaa60f5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, &(0x7f0000000500)={[{0x2b, 'io'}, {0x2d, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'rdma'}, {0xc7db916e610a8fe0, 'cpu'}, {0x2f, 'cpu'}]}, 0x1f) 00:51:15 executing program 2: r0 = socket$kcm(0x10, 0x800000000003, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="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", 0xfb}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) 00:51:15 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000006a80)={&(0x7f0000006700)=@can={0x1d, 0x0}, 0x80, &(0x7f00000069c0)=[{0x0}, {&(0x7f0000006880)=""/95, 0x5f}, {0x0}], 0x3, &(0x7f0000006a00)=""/104, 0x68}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000006ac0)='memory.events\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000006b00)={0xf, 0x0, 0x0, 0x80000001, 0x0, 0xffffffffffffffff, 0x0, [], r0, r1, 0x3, 0x4}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000100)={0xffffffffffffff9c}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x4, 0x3, 0x0, 0x0, 0x12, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x8000000000000000}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00, 0x0, 0x0, 0x2000]}, 0x2c) 00:51:15 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x6, &(0x7f0000000100), 0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x3b, 0x0, 0x0) [ 434.496961][T21175] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.2'. [ 434.560022][T21180] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.2'. 00:51:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 00:51:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 00:51:15 executing program 2: r0 = socket$kcm(0x10, 0x800000000003, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="fb0000002c00015bbfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d70800000006000008b6000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) 00:51:16 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000006a80)={&(0x7f0000006700)=@can={0x1d, 0x0}, 0x80, &(0x7f00000069c0)=[{0x0}, {&(0x7f0000006880)=""/95, 0x5f}, {0x0}], 0x3, &(0x7f0000006a00)=""/104, 0x68}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000006ac0)='memory.events\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000006b00)={0xf, 0x0, 0x0, 0x80000001, 0x0, 0xffffffffffffffff, 0x0, [], r0, r1, 0x3, 0x4}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000100)={0xffffffffffffff9c}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x4, 0x3, 0x0, 0x0, 0x12, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x8000000000000000}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11036, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00, 0x0, 0x0, 0x2000]}, 0x2c) [ 434.977734][T21198] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.2'. 00:51:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 00:51:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 00:51:16 executing program 2: r0 = socket$kcm(0x10, 0x800000000003, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="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", 0xfb}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) [ 435.297324][T21214] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.2'. [ 436.076963][T21221] IPVS: ftp: loaded support on port[0] = 21 [ 436.272130][T21221] chnl_net:caif_netlink_parms(): no params data found [ 436.364758][T21221] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.371901][T21221] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.380160][T21221] device bridge_slave_0 entered promiscuous mode [ 436.388383][T21221] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.395746][T21221] bridge0: port 2(bridge_slave_1) entered disabled state [ 436.403487][T21221] device bridge_slave_1 entered promiscuous mode [ 436.497485][T21221] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 436.509051][T21221] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 436.527650][T21221] team0: Port device team_slave_0 added [ 436.535058][T21221] team0: Port device team_slave_1 added [ 436.646990][T21221] device hsr_slave_0 entered promiscuous mode [ 436.704978][T21221] device hsr_slave_1 entered promiscuous mode [ 436.744411][T21221] debugfs: Directory 'hsr0' with parent '/' already present! [ 436.813005][T21221] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.820147][T21221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 436.827551][T21221] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.834680][T21221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 436.873161][T21221] 8021q: adding VLAN 0 to HW filter on device bond0 [ 436.948006][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 436.956519][ T8781] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.964890][ T8781] bridge0: port 2(bridge_slave_1) entered disabled state [ 436.973398][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 436.988462][T21221] 8021q: adding VLAN 0 to HW filter on device team0 [ 437.002009][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 437.010654][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.017737][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 437.065770][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 437.074535][T21145] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.081699][T21145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.145973][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 437.154811][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 437.163416][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 437.173264][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 437.187317][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 437.199656][T21221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 437.281288][T21221] 8021q: adding VLAN 0 to HW filter on device batadv0 00:51:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff024}, {0x16}]}) 00:51:18 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="0501e0ffffffff287ef7af7cbaabd7eed6b85e7ae2227160"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xffffffffffffffb7) socket$kcm(0x2, 0x3, 0x84) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x3, 0x80007, 0xc4e, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) getpid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000040)="63cee2ec881bdcba676a09f0b8a16f8c67c1c6524d0de5f095cee607e6cc0fc8d73782deb7ee8a464974956127dd3f7c423987860127ce3e4dea9d", 0x0, 0x2}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x1, 0x1, 0x1ff, 0x0, 0x80000000, 0x20000, 0x0, 0x0, 0x5, 0x0, 0x28, 0x20, 0x2, 0x2, 0x8c, 0x400, 0xa, 0xa2, 0x5, 0x2, 0x6, 0x6, 0xe1, 0x8, 0x8, 0x9, 0x81, 0x10000, 0x7bd7, 0x4, 0x7, 0xfffffffffffff9f6, 0x5, 0x8, 0x24, 0x0, 0xbd, 0x0, @perf_config_ext={0x46a, 0x2}, 0x4, 0x1, 0x7, 0x7, 0x2, 0x542d1139, 0xfffffffffffeffff}, r1, 0x9, r1, 0x5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x40000b) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x4) openat$cgroup_ro(r1, &(0x7f00000004c0)='io.stat\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000005c0)={r0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) write$cgroup_pid(r3, &(0x7f0000000000), 0xcbaa60f5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, &(0x7f0000000500)={[{0x2b, 'io'}, {0x2d, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'rdma'}, {0xc7db916e610a8fe0, 'cpu'}, {0x2f, 'cpu'}]}, 0x1f) 00:51:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 00:51:18 executing program 2: r0 = socket$kcm(0x10, 0x800000000003, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="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", 0xfb}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) 00:51:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 00:51:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 437.574877][T21239] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.2'. 00:51:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 00:51:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 00:51:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 00:51:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 00:51:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff024}, {0x16}]}) 00:51:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 00:51:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 00:51:19 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="0501e0ffffffff287ef7af7cbaabd7eed6b85e7ae2227160"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xffffffffffffffb7) socket$kcm(0x2, 0x3, 0x84) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x3, 0x80007, 0xc4e, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) getpid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000040)="63cee2ec881bdcba676a09f0b8a16f8c67c1c6524d0de5f095cee607e6cc0fc8d73782deb7ee8a464974956127dd3f7c423987860127ce3e4dea9d", 0x0, 0x2}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x1, 0x1, 0x1ff, 0x0, 0x80000000, 0x20000, 0x0, 0x0, 0x5, 0x0, 0x28, 0x20, 0x2, 0x2, 0x8c, 0x400, 0xa, 0xa2, 0x5, 0x2, 0x6, 0x6, 0xe1, 0x8, 0x8, 0x9, 0x81, 0x10000, 0x7bd7, 0x4, 0x7, 0xfffffffffffff9f6, 0x5, 0x8, 0x24, 0x0, 0xbd, 0x0, @perf_config_ext={0x46a, 0x2}, 0x4, 0x1, 0x7, 0x7, 0x2, 0x542d1139, 0xfffffffffffeffff}, r1, 0x9, r1, 0x5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x40000b) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x4) openat$cgroup_ro(r1, &(0x7f00000004c0)='io.stat\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000005c0)={r0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) write$cgroup_pid(r3, &(0x7f0000000000), 0xcbaa60f5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, &(0x7f0000000500)={[{0x2b, 'io'}, {0x2d, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'rdma'}, {0xc7db916e610a8fe0, 'cpu'}, {0x2f, 'cpu'}]}, 0x1f) 00:51:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 00:51:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 00:51:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 00:51:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff024}, {0x16}]}) 00:51:19 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="0501e0ffffffff287ef7af7cbaabd7eed6b85e7ae2227160"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xffffffffffffffb7) socket$kcm(0x2, 0x3, 0x84) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x3, 0x80007, 0xc4e, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) getpid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000040)="63cee2ec881bdcba676a09f0b8a16f8c67c1c6524d0de5f095cee607e6cc0fc8d73782deb7ee8a464974956127dd3f7c423987860127ce3e4dea9d", 0x0, 0x2}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x1, 0x1, 0x1ff, 0x0, 0x80000000, 0x20000, 0x0, 0x0, 0x5, 0x0, 0x28, 0x20, 0x2, 0x2, 0x8c, 0x400, 0xa, 0xa2, 0x5, 0x2, 0x6, 0x6, 0xe1, 0x8, 0x8, 0x9, 0x81, 0x10000, 0x7bd7, 0x4, 0x7, 0xfffffffffffff9f6, 0x5, 0x8, 0x24, 0x0, 0xbd, 0x0, @perf_config_ext={0x46a, 0x2}, 0x4, 0x1, 0x7, 0x7, 0x2, 0x542d1139, 0xfffffffffffeffff}, r1, 0x9, r1, 0x5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x40000b) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x4) openat$cgroup_ro(r1, &(0x7f00000004c0)='io.stat\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000005c0)={r0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) write$cgroup_pid(r3, &(0x7f0000000000), 0xcbaa60f5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, &(0x7f0000000500)={[{0x2b, 'io'}, {0x2d, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'rdma'}, {0xc7db916e610a8fe0, 'cpu'}, {0x2f, 'cpu'}]}, 0x1f) 00:51:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x38e) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000004c0)={0x2, 0xa, 0xffff, 0xfff}, &(0x7f0000000500)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x8}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x4, 0xf83, 0x4, 0x3ff}, {0x80, 0x7ff, 0x9, 0x9}]}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r6, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 00:51:19 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x8, 0x0, 0xc6) 00:51:19 executing program 2: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) openat$cgroup_ro(r1, &(0x7f0000000440)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'ifb0\x00'}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) 00:51:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000200081ae00060c00000f000002000058650300018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 00:51:19 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x8, 0x0, 0xc6) [ 438.896106][T21303] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. 00:51:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x802, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e0000002b008182e4b1e6a9735082cf0324b0eba06ef9075b3f00169148790700d90080e2300000000000000000", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) [ 439.017182][T21306] device nr0 entered promiscuous mode [ 439.059926][T21310] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 439.365994][T21313] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 00:51:20 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x8, 0x0, 0xc6) 00:51:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c00)=[{0x0}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="020000800000"], 0x6) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000700)={'veth0_to_bridge\x00', 0x8000}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) socket$kcm(0xa, 0x0, 0x3a) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0xc48e, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x3}, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x95e}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0xfffffeb4) openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) openat$cgroup_ro(r2, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) 00:51:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000200081ae00060c00000f000002000058650300018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 00:51:20 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="0501e0ffffffff287ef7af7cbaabd7eed6b85e7ae2227160"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xffffffffffffffb7) socket$kcm(0x2, 0x3, 0x84) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x3, 0x80007, 0xc4e, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) getpid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000040)="63cee2ec881bdcba676a09f0b8a16f8c67c1c6524d0de5f095cee607e6cc0fc8d73782deb7ee8a464974956127dd3f7c423987860127ce3e4dea9d", 0x0, 0x2}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x1, 0x1, 0x1ff, 0x0, 0x80000000, 0x20000, 0x0, 0x0, 0x5, 0x0, 0x28, 0x20, 0x2, 0x2, 0x8c, 0x400, 0xa, 0xa2, 0x5, 0x2, 0x6, 0x6, 0xe1, 0x8, 0x8, 0x9, 0x81, 0x10000, 0x7bd7, 0x4, 0x7, 0xfffffffffffff9f6, 0x5, 0x8, 0x24, 0x0, 0xbd, 0x0, @perf_config_ext={0x46a, 0x2}, 0x4, 0x1, 0x7, 0x7, 0x2, 0x542d1139, 0xfffffffffffeffff}, r1, 0x9, r1, 0x5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x40000b) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x4) openat$cgroup_ro(r1, &(0x7f00000004c0)='io.stat\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000005c0)={r0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) write$cgroup_pid(r3, &(0x7f0000000000), 0xcbaa60f5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, &(0x7f0000000500)={[{0x2b, 'io'}, {0x2d, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'rdma'}, {0xc7db916e610a8fe0, 'cpu'}, {0x2f, 'cpu'}]}, 0x1f) 00:51:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x802, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e0000002b008182e4b1e6a9735082cf0324b0eba06ef9075b3f00169148790700d90080e2300000000000000000", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) 00:51:20 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x8, 0x0, 0xc6) [ 439.531717][T21316] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. [ 439.559685][T21319] device nr0 entered promiscuous mode 00:51:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000200081ae00060c00000f000002000058650300018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) [ 439.641300][T21333] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 00:51:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x10e, 0xb, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000540)="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", 0xfb}], 0x1}, 0x0) [ 440.104228][T21345] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. 00:51:21 executing program 2: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) openat$cgroup_ro(r1, &(0x7f0000000440)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'ifb0\x00'}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) 00:51:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x10e, 0xb, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000540)="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", 0xfb}], 0x1}, 0x0) 00:51:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000200081ae00060c00000f000002000058650300018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 00:51:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x802, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e0000002b008182e4b1e6a9735082cf0324b0eba06ef9075b3f00169148790700d90080e2300000000000000000", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) 00:51:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x10e, 0xb, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000540)="fb0000002e04af2c8bd22f67d5f5c1ba19bf460e636d0107bfa9d345e7eb8d99c1ffffff0e00050043bc59198183fe204ee2d708000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac02206006ccec93f9f070000000000008e92", 0xfb}], 0x1}, 0x0) [ 440.359831][T21367] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 440.492387][T21368] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. [ 440.518835][ T7] device bridge_slave_1 left promiscuous mode [ 440.531218][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.586446][ T7] device bridge_slave_0 left promiscuous mode [ 440.611497][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.676976][ T7] device bridge_slave_1 left promiscuous mode [ 440.683501][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.725863][ T7] device bridge_slave_0 left promiscuous mode [ 440.732319][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.775825][ T7] device bridge_slave_1 left promiscuous mode [ 440.782057][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.835357][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.886991][ T7] device bridge_slave_1 left promiscuous mode [ 440.893389][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.956745][ T7] device bridge_slave_0 left promiscuous mode [ 440.963510][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.240474][ T7] device hsr_slave_0 left promiscuous mode [ 449.304506][ T7] device hsr_slave_1 left promiscuous mode [ 449.388582][ T7] team0 (unregistering): Port device team_slave_1 removed [ 449.403376][ T7] team0 (unregistering): Port device team_slave_0 removed [ 449.416430][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 449.463645][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 449.553766][ T7] bond0 (unregistering): Released all slaves [ 449.814896][ T7] device hsr_slave_0 left promiscuous mode [ 449.864649][ T7] device hsr_slave_1 left promiscuous mode [ 449.942990][ T7] team0 (unregistering): Port device team_slave_1 removed [ 449.957558][ T7] team0 (unregistering): Port device team_slave_0 removed [ 449.969231][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 450.014223][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 450.096901][ T7] bond0 (unregistering): Released all slaves [ 450.275047][ T7] device hsr_slave_0 left promiscuous mode [ 450.324704][ T7] device hsr_slave_1 left promiscuous mode [ 450.403696][ T7] team0 (unregistering): Port device team_slave_1 removed [ 450.418258][ T7] team0 (unregistering): Port device team_slave_0 removed [ 450.431025][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 450.461631][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 450.556677][ T7] bond0 (unregistering): Released all slaves [ 450.695183][ T7] device hsr_slave_0 left promiscuous mode [ 450.734570][ T7] device hsr_slave_1 left promiscuous mode [ 450.788310][ T7] team0 (unregistering): Port device team_slave_1 removed [ 450.802867][ T7] team0 (unregistering): Port device team_slave_0 removed [ 450.815020][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 450.861749][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 450.962441][ T7] bond0 (unregistering): Released all slaves [ 451.105979][T21377] device nr0 entered promiscuous mode 00:51:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c00)=[{0x0}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="020000800000"], 0x6) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000700)={'veth0_to_bridge\x00', 0x8000}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) socket$kcm(0xa, 0x0, 0x3a) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0xc48e, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x3}, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x95e}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0xfffffeb4) openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) openat$cgroup_ro(r2, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) 00:51:32 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="0501e0ffffffff287ef7af7cbaabd7eed6b85e7ae2227160"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xffffffffffffffb7) socket$kcm(0x2, 0x3, 0x84) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x3, 0x80007, 0xc4e, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) getpid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000040)="63cee2ec881bdcba676a09f0b8a16f8c67c1c6524d0de5f095cee607e6cc0fc8d73782deb7ee8a464974956127dd3f7c423987860127ce3e4dea9d", 0x0, 0x2}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x1, 0x1, 0x1ff, 0x0, 0x80000000, 0x20000, 0x0, 0x0, 0x5, 0x0, 0x28, 0x20, 0x2, 0x2, 0x8c, 0x400, 0xa, 0xa2, 0x5, 0x2, 0x6, 0x6, 0xe1, 0x8, 0x8, 0x9, 0x81, 0x10000, 0x7bd7, 0x4, 0x7, 0xfffffffffffff9f6, 0x5, 0x8, 0x24, 0x0, 0xbd, 0x0, @perf_config_ext={0x46a, 0x2}, 0x4, 0x1, 0x7, 0x7, 0x2, 0x542d1139, 0xfffffffffffeffff}, r1, 0x9, r1, 0x5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x40000b) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x4) openat$cgroup_ro(r1, &(0x7f00000004c0)='io.stat\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000005c0)={r0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) write$cgroup_pid(r3, &(0x7f0000000000), 0xcbaa60f5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, &(0x7f0000000500)={[{0x2b, 'io'}, {0x2d, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'rdma'}, {0xc7db916e610a8fe0, 'cpu'}, {0x2f, 'cpu'}]}, 0x1f) 00:51:32 executing program 5: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) openat$cgroup_ro(r1, &(0x7f0000000440)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'ifb0\x00'}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) 00:51:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x10e, 0xb, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000540)="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", 0xfb}], 0x1}, 0x0) 00:51:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x802, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e0000002b008182e4b1e6a9735082cf0324b0eba06ef9075b3f00169148790700d90080e2300000000000000000", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) 00:51:32 executing program 2: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) openat$cgroup_ro(r1, &(0x7f0000000440)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'ifb0\x00'}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) [ 451.278489][T21394] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 451.508163][T21405] device nr0 entered promiscuous mode [ 451.696909][T21410] device nr0 entered promiscuous mode 00:51:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c00)=[{0x0}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="020000800000"], 0x6) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000700)={'veth0_to_bridge\x00', 0x8000}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) socket$kcm(0xa, 0x0, 0x3a) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0xc48e, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x3}, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x95e}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0xfffffeb4) openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) openat$cgroup_ro(r2, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) 00:51:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c00)=[{0x0}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="020000800000"], 0x6) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000700)={'veth0_to_bridge\x00', 0x8000}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) socket$kcm(0xa, 0x0, 0x3a) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0xc48e, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x3}, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x95e}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0xfffffeb4) openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) openat$cgroup_ro(r2, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) 00:51:33 executing program 5: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) openat$cgroup_ro(r1, &(0x7f0000000440)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'ifb0\x00'}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) 00:51:33 executing program 0: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f0000000180)="f4001100002b2c25e994efd18498d66205baa68754a30000000002000000000000000000000000002100000000000000c00100010502f32ebdbed828026256be5452644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 00:51:33 executing program 0: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f0000000180)="f4001100002b2c25e994efd18498d66205baa68754a30000000002000000000000000000000000002100000000000000c00100010502f32ebdbed828026256be5452644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 00:51:33 executing program 0: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f0000000180)="f4001100002b2c25e994efd18498d66205baa68754a30000000002000000000000000000000000002100000000000000c00100010502f32ebdbed828026256be5452644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 00:51:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c00)=[{0x0}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="020000800000"], 0x6) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000700)={'veth0_to_bridge\x00', 0x8000}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) socket$kcm(0xa, 0x0, 0x3a) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0xc48e, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x3}, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x95e}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0xfffffeb4) openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) openat$cgroup_ro(r2, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) 00:51:33 executing program 0: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f0000000180)="f4001100002b2c25e994efd18498d66205baa68754a30000000002000000000000000000000000002100000000000000c00100010502f32ebdbed828026256be5452644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 00:51:33 executing program 0: r0 = socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x10, 0x400800000000004, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0xfffbbffe00000003, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000b40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8e, 0x8e, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x5, 0x4}]}, @datasec={0x5, 0x2, 0x0, 0xf, 0x2, [{0x1, 0x101, 0x6}, {0x0, 0x0, 0x40}], "cfef"}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x0, 0x5}, {0x5, 0x3}, {0x6, 0x5}, {0x3, 0x4}, {}, {0x1, 0x4}]}, @volatile={0x4, 0x0, 0x0, 0x9, 0x3}, @ptr={0x4}]}, {0x0, [0x2e, 0x7f, 0x61, 0x0, 0x2e, 0x7f, 0x71]}}, 0x0, 0xb1, 0x0, 0x1}, 0x20) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000440)=""/184, 0xb8}], 0x1}, 0x10020) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 452.568326][T21447] device nr0 entered promiscuous mode 00:51:33 executing program 2: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) openat$cgroup_ro(r1, &(0x7f0000000440)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'ifb0\x00'}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) [ 452.929563][T21471] device nr0 entered promiscuous mode 00:51:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c00)=[{0x0}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="020000800000"], 0x6) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000700)={'veth0_to_bridge\x00', 0x8000}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) socket$kcm(0xa, 0x0, 0x3a) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0xc48e, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x3}, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x95e}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0xfffffeb4) openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) openat$cgroup_ro(r2, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) 00:51:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c00)=[{0x0}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="020000800000"], 0x6) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000700)={'veth0_to_bridge\x00', 0x8000}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) socket$kcm(0xa, 0x0, 0x3a) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0xc48e, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x3}, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x95e}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0xfffffeb4) openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) openat$cgroup_ro(r2, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) [ 453.256667][T21483] device nr0 entered promiscuous mode 00:51:34 executing program 5: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) openat$cgroup_ro(r1, &(0x7f0000000440)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'ifb0\x00'}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) [ 454.037945][T21517] device nr0 entered promiscuous mode 00:51:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c00)=[{0x0}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="020000800000"], 0x6) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000700)={'veth0_to_bridge\x00', 0x8000}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) socket$kcm(0xa, 0x0, 0x3a) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0xc48e, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x3}, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x95e}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0xfffffeb4) openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) openat$cgroup_ro(r2, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) 00:51:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x2, 0x10, 0x0, 0x4000000000000000}, [@call={0x85, 0x0, 0x0, 0x24}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x2da, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:51:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000000000300000000030000000200000000000000000000000000000100000f0a405b00000000"], &(0x7f0000000100)=""/213, 0x42, 0xd5, 0x1}, 0x20) [ 454.190127][T21528] syz-executor.2[21528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 454.195198][T21528] syz-executor.2[21528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! 00:51:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c00)=[{0x0}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="020000800000"], 0x6) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000700)={'veth0_to_bridge\x00', 0x8000}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) socket$kcm(0xa, 0x0, 0x3a) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0xc48e, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x3}, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x95e}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0xfffffeb4) openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) openat$cgroup_ro(r2, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) 00:51:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000000000300000000030000000200000000000000000000000000000100000f0a405b00000000"], &(0x7f0000000100)=""/213, 0x42, 0xd5, 0x1}, 0x20) 00:51:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c00)=[{0x0}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="020000800000"], 0x6) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000700)={'veth0_to_bridge\x00', 0x8000}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) socket$kcm(0xa, 0x0, 0x3a) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0xc48e, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x3}, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x95e}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0xfffffeb4) openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) openat$cgroup_ro(r2, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) 00:51:35 executing program 0: r0 = socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x10, 0x400800000000004, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0xfffbbffe00000003, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000b40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8e, 0x8e, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x5, 0x4}]}, @datasec={0x5, 0x2, 0x0, 0xf, 0x2, [{0x1, 0x101, 0x6}, {0x0, 0x0, 0x40}], "cfef"}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x0, 0x5}, {0x5, 0x3}, {0x6, 0x5}, {0x3, 0x4}, {}, {0x1, 0x4}]}, @volatile={0x4, 0x0, 0x0, 0x9, 0x3}, @ptr={0x4}]}, {0x0, [0x2e, 0x7f, 0x61, 0x0, 0x2e, 0x7f, 0x71]}}, 0x0, 0xb1, 0x0, 0x1}, 0x20) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000440)=""/184, 0xb8}], 0x1}, 0x10020) recvmsg(0xffffffffffffffff, 0x0, 0x0) 00:51:35 executing program 5: r0 = socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x10, 0x400800000000004, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0xfffbbffe00000003, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000b40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8e, 0x8e, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x5, 0x4}]}, @datasec={0x5, 0x2, 0x0, 0xf, 0x2, [{0x1, 0x101, 0x6}, {0x0, 0x0, 0x40}], "cfef"}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x0, 0x5}, {0x5, 0x3}, {0x6, 0x5}, {0x3, 0x4}, {}, {0x1, 0x4}]}, @volatile={0x4, 0x0, 0x0, 0x9, 0x3}, @ptr={0x4}]}, {0x0, [0x2e, 0x7f, 0x61, 0x0, 0x2e, 0x7f, 0x71]}}, 0x0, 0xb1, 0x0, 0x1}, 0x20) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000440)=""/184, 0xb8}], 0x1}, 0x10020) recvmsg(0xffffffffffffffff, 0x0, 0x0) 00:51:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000000000300000000030000000200000000000000000000000000000100000f0a405b00000000"], &(0x7f0000000100)=""/213, 0x42, 0xd5, 0x1}, 0x20) 00:51:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000000000300000000030000000200000000000000000000000000000100000f0a405b00000000"], &(0x7f0000000100)=""/213, 0x42, 0xd5, 0x1}, 0x20) 00:51:36 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002200)={&(0x7f0000001ec0)=@can={0x1d, 0x0}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001f40)=""/187, 0xbb}, {&(0x7f0000002000)=""/156, 0x9c}, {0x0}, {&(0x7f0000002100)=""/179, 0xb3}], 0x4}, 0x163) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r3) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000002f00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6o\x9b\x99M\xf8\x87\x1a\xf1\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+\xdb-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\x00v\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x890c, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000003b40)={&(0x7f0000002240)=@xdp={0x2c, 0x0, r1, 0x3e}, 0x80, &(0x7f0000002680)=[{&(0x7f00000025c0)="744f49f009143cab4b2c41124ca5b3fbf74c4e18bc80005b74e9c2171a57f86300e82f12f1cb30e85e8305add5b73913779d7117941ed7e907d0438adf33fdae2982b595efbf1fbc601ef674d6c554d9552723d315fdbc5809fdd61410b3", 0x5e}], 0x1}, 0x0) r5 = socket$kcm(0x2, 0x1000000000000805, 0x84) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000100)=0xffffffffffffff81, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) [ 455.276969][T21561] device nr0 entered promiscuous mode 00:51:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000030000003d0301000000000095000000000000007126000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf050000000000000f650000000000006507f4ff02000000070700004c0000001f00000000000000bf54000000000000070500000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x70, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x5, 0x8, 0x1, 0x9, 0x1, 0x2, 0x8000, 0x0, 0x0, 0x4d8c4fdb, 0x0, 0x46d, 0x6, 0x5, 0x0, 0x100, 0x2, 0xf1, 0x7, 0x8, 0x2, 0x3, 0x300, 0x3, 0x0, 0x82, 0x0, 0x0, 0x100000000, 0x1, 0x42bd, 0x0, 0x8, 0x5, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f00000003c0)='eth0\x00'}, 0x30) r2 = perf_event_open(0x0, r1, 0x8, r0, 0xb) close(r2) [ 455.974174][T21563] device nr0 entered promiscuous mode 00:51:37 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002200)={&(0x7f0000001ec0)=@can={0x1d, 0x0}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001f40)=""/187, 0xbb}, {&(0x7f0000002000)=""/156, 0x9c}, {0x0}, {&(0x7f0000002100)=""/179, 0xb3}], 0x4}, 0x163) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r3) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000002f00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6o\x9b\x99M\xf8\x87\x1a\xf1\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+\xdb-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\x00v\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x890c, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000003b40)={&(0x7f0000002240)=@xdp={0x2c, 0x0, r1, 0x3e}, 0x80, &(0x7f0000002680)=[{&(0x7f00000025c0)="744f49f009143cab4b2c41124ca5b3fbf74c4e18bc80005b74e9c2171a57f86300e82f12f1cb30e85e8305add5b73913779d7117941ed7e907d0438adf33fdae2982b595efbf1fbc601ef674d6c554d9552723d315fdbc5809fdd61410b3", 0x5e}], 0x1}, 0x0) r5 = socket$kcm(0x2, 0x1000000000000805, 0x84) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000100)=0xffffffffffffff81, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 00:51:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000030000003d0301000000000095000000000000007126000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf050000000000000f650000000000006507f4ff02000000070700004c0000001f00000000000000bf54000000000000070500000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x70, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x5, 0x8, 0x1, 0x9, 0x1, 0x2, 0x8000, 0x0, 0x0, 0x4d8c4fdb, 0x0, 0x46d, 0x6, 0x5, 0x0, 0x100, 0x2, 0xf1, 0x7, 0x8, 0x2, 0x3, 0x300, 0x3, 0x0, 0x82, 0x0, 0x0, 0x100000000, 0x1, 0x42bd, 0x0, 0x8, 0x5, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f00000003c0)='eth0\x00'}, 0x30) r2 = perf_event_open(0x0, r1, 0x8, r0, 0xb) close(r2) 00:51:38 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002200)={&(0x7f0000001ec0)=@can={0x1d, 0x0}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001f40)=""/187, 0xbb}, {&(0x7f0000002000)=""/156, 0x9c}, {0x0}, {&(0x7f0000002100)=""/179, 0xb3}], 0x4}, 0x163) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r3) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000002f00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6o\x9b\x99M\xf8\x87\x1a\xf1\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+\xdb-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\x00v\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x890c, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000003b40)={&(0x7f0000002240)=@xdp={0x2c, 0x0, r1, 0x3e}, 0x80, &(0x7f0000002680)=[{&(0x7f00000025c0)="744f49f009143cab4b2c41124ca5b3fbf74c4e18bc80005b74e9c2171a57f86300e82f12f1cb30e85e8305add5b73913779d7117941ed7e907d0438adf33fdae2982b595efbf1fbc601ef674d6c554d9552723d315fdbc5809fdd61410b3", 0x5e}], 0x1}, 0x0) r5 = socket$kcm(0x2, 0x1000000000000805, 0x84) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000100)=0xffffffffffffff81, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 00:51:38 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002200)={&(0x7f0000001ec0)=@can={0x1d, 0x0}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001f40)=""/187, 0xbb}, {&(0x7f0000002000)=""/156, 0x9c}, {0x0}, {&(0x7f0000002100)=""/179, 0xb3}], 0x4}, 0x163) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r3) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000002f00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6o\x9b\x99M\xf8\x87\x1a\xf1\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+\xdb-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\x00v\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x890c, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000003b40)={&(0x7f0000002240)=@xdp={0x2c, 0x0, r1, 0x3e}, 0x80, &(0x7f0000002680)=[{&(0x7f00000025c0)="744f49f009143cab4b2c41124ca5b3fbf74c4e18bc80005b74e9c2171a57f86300e82f12f1cb30e85e8305add5b73913779d7117941ed7e907d0438adf33fdae2982b595efbf1fbc601ef674d6c554d9552723d315fdbc5809fdd61410b3", 0x5e}], 0x1}, 0x0) r5 = socket$kcm(0x2, 0x1000000000000805, 0x84) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000100)=0xffffffffffffff81, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 00:51:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000030000003d0301000000000095000000000000007126000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf050000000000000f650000000000006507f4ff02000000070700004c0000001f00000000000000bf54000000000000070500000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x70, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x5, 0x8, 0x1, 0x9, 0x1, 0x2, 0x8000, 0x0, 0x0, 0x4d8c4fdb, 0x0, 0x46d, 0x6, 0x5, 0x0, 0x100, 0x2, 0xf1, 0x7, 0x8, 0x2, 0x3, 0x300, 0x3, 0x0, 0x82, 0x0, 0x0, 0x100000000, 0x1, 0x42bd, 0x0, 0x8, 0x5, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f00000003c0)='eth0\x00'}, 0x30) r2 = perf_event_open(0x0, r1, 0x8, r0, 0xb) close(r2) 00:51:38 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002200)={&(0x7f0000001ec0)=@can={0x1d, 0x0}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001f40)=""/187, 0xbb}, {&(0x7f0000002000)=""/156, 0x9c}, {0x0}, {&(0x7f0000002100)=""/179, 0xb3}], 0x4}, 0x163) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r3) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000002f00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6o\x9b\x99M\xf8\x87\x1a\xf1\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+\xdb-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\x00v\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x890c, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000003b40)={&(0x7f0000002240)=@xdp={0x2c, 0x0, r1, 0x3e}, 0x80, &(0x7f0000002680)=[{&(0x7f00000025c0)="744f49f009143cab4b2c41124ca5b3fbf74c4e18bc80005b74e9c2171a57f86300e82f12f1cb30e85e8305add5b73913779d7117941ed7e907d0438adf33fdae2982b595efbf1fbc601ef674d6c554d9552723d315fdbc5809fdd61410b3", 0x5e}], 0x1}, 0x0) r5 = socket$kcm(0x2, 0x1000000000000805, 0x84) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000100)=0xffffffffffffff81, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 00:51:38 executing program 0: r0 = socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x10, 0x400800000000004, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0xfffbbffe00000003, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000b40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8e, 0x8e, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x5, 0x4}]}, @datasec={0x5, 0x2, 0x0, 0xf, 0x2, [{0x1, 0x101, 0x6}, {0x0, 0x0, 0x40}], "cfef"}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x0, 0x5}, {0x5, 0x3}, {0x6, 0x5}, {0x3, 0x4}, {}, {0x1, 0x4}]}, @volatile={0x4, 0x0, 0x0, 0x9, 0x3}, @ptr={0x4}]}, {0x0, [0x2e, 0x7f, 0x61, 0x0, 0x2e, 0x7f, 0x71]}}, 0x0, 0xb1, 0x0, 0x1}, 0x20) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000440)=""/184, 0xb8}], 0x1}, 0x10020) recvmsg(0xffffffffffffffff, 0x0, 0x0) 00:51:38 executing program 5: r0 = socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x10, 0x400800000000004, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0xfffbbffe00000003, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000b40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8e, 0x8e, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x5, 0x4}]}, @datasec={0x5, 0x2, 0x0, 0xf, 0x2, [{0x1, 0x101, 0x6}, {0x0, 0x0, 0x40}], "cfef"}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x0, 0x5}, {0x5, 0x3}, {0x6, 0x5}, {0x3, 0x4}, {}, {0x1, 0x4}]}, @volatile={0x4, 0x0, 0x0, 0x9, 0x3}, @ptr={0x4}]}, {0x0, [0x2e, 0x7f, 0x61, 0x0, 0x2e, 0x7f, 0x71]}}, 0x0, 0xb1, 0x0, 0x1}, 0x20) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000440)=""/184, 0xb8}], 0x1}, 0x10020) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 458.188198][T21639] device nr0 entered promiscuous mode 00:51:39 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002200)={&(0x7f0000001ec0)=@can={0x1d, 0x0}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001f40)=""/187, 0xbb}, {&(0x7f0000002000)=""/156, 0x9c}, {0x0}, {&(0x7f0000002100)=""/179, 0xb3}], 0x4}, 0x163) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r3) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000002f00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6o\x9b\x99M\xf8\x87\x1a\xf1\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+\xdb-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\x00v\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x890c, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000003b40)={&(0x7f0000002240)=@xdp={0x2c, 0x0, r1, 0x3e}, 0x80, &(0x7f0000002680)=[{&(0x7f00000025c0)="744f49f009143cab4b2c41124ca5b3fbf74c4e18bc80005b74e9c2171a57f86300e82f12f1cb30e85e8305add5b73913779d7117941ed7e907d0438adf33fdae2982b595efbf1fbc601ef674d6c554d9552723d315fdbc5809fdd61410b3", 0x5e}], 0x1}, 0x0) r5 = socket$kcm(0x2, 0x1000000000000805, 0x84) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000100)=0xffffffffffffff81, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 00:51:39 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002200)={&(0x7f0000001ec0)=@can={0x1d, 0x0}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001f40)=""/187, 0xbb}, {&(0x7f0000002000)=""/156, 0x9c}, {0x0}, {&(0x7f0000002100)=""/179, 0xb3}], 0x4}, 0x163) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r3) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000002f00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6o\x9b\x99M\xf8\x87\x1a\xf1\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+\xdb-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\x00v\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x890c, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000003b40)={&(0x7f0000002240)=@xdp={0x2c, 0x0, r1, 0x3e}, 0x80, &(0x7f0000002680)=[{&(0x7f00000025c0)="744f49f009143cab4b2c41124ca5b3fbf74c4e18bc80005b74e9c2171a57f86300e82f12f1cb30e85e8305add5b73913779d7117941ed7e907d0438adf33fdae2982b595efbf1fbc601ef674d6c554d9552723d315fdbc5809fdd61410b3", 0x5e}], 0x1}, 0x0) r5 = socket$kcm(0x2, 0x1000000000000805, 0x84) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000100)=0xffffffffffffff81, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 00:51:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000030000003d0301000000000095000000000000007126000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf050000000000000f650000000000006507f4ff02000000070700004c0000001f00000000000000bf54000000000000070500000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x70, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x5, 0x8, 0x1, 0x9, 0x1, 0x2, 0x8000, 0x0, 0x0, 0x4d8c4fdb, 0x0, 0x46d, 0x6, 0x5, 0x0, 0x100, 0x2, 0xf1, 0x7, 0x8, 0x2, 0x3, 0x300, 0x3, 0x0, 0x82, 0x0, 0x0, 0x100000000, 0x1, 0x42bd, 0x0, 0x8, 0x5, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f00000003c0)='eth0\x00'}, 0x30) r2 = perf_event_open(0x0, r1, 0x8, r0, 0xb) close(r2) 00:51:39 executing program 0: r0 = socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x10, 0x400800000000004, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0xfffbbffe00000003, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000b40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8e, 0x8e, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x5, 0x4}]}, @datasec={0x5, 0x2, 0x0, 0xf, 0x2, [{0x1, 0x101, 0x6}, {0x0, 0x0, 0x40}], "cfef"}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x0, 0x5}, {0x5, 0x3}, {0x6, 0x5}, {0x3, 0x4}, {}, {0x1, 0x4}]}, @volatile={0x4, 0x0, 0x0, 0x9, 0x3}, @ptr={0x4}]}, {0x0, [0x2e, 0x7f, 0x61, 0x0, 0x2e, 0x7f, 0x71]}}, 0x0, 0xb1, 0x0, 0x1}, 0x20) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000440)=""/184, 0xb8}], 0x1}, 0x10020) recvmsg(0xffffffffffffffff, 0x0, 0x0) 00:51:40 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002200)={&(0x7f0000001ec0)=@can={0x1d, 0x0}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001f40)=""/187, 0xbb}, {&(0x7f0000002000)=""/156, 0x9c}, {0x0}, {&(0x7f0000002100)=""/179, 0xb3}], 0x4}, 0x163) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r3) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000002f00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6o\x9b\x99M\xf8\x87\x1a\xf1\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+\xdb-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\x00v\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x890c, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000003b40)={&(0x7f0000002240)=@xdp={0x2c, 0x0, r1, 0x3e}, 0x80, &(0x7f0000002680)=[{&(0x7f00000025c0)="744f49f009143cab4b2c41124ca5b3fbf74c4e18bc80005b74e9c2171a57f86300e82f12f1cb30e85e8305add5b73913779d7117941ed7e907d0438adf33fdae2982b595efbf1fbc601ef674d6c554d9552723d315fdbc5809fdd61410b3", 0x5e}], 0x1}, 0x0) r5 = socket$kcm(0x2, 0x1000000000000805, 0x84) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000100)=0xffffffffffffff81, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 00:51:40 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002200)={&(0x7f0000001ec0)=@can={0x1d, 0x0}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001f40)=""/187, 0xbb}, {&(0x7f0000002000)=""/156, 0x9c}, {0x0}, {&(0x7f0000002100)=""/179, 0xb3}], 0x4}, 0x163) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r3) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000002f00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6o\x9b\x99M\xf8\x87\x1a\xf1\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+\xdb-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\x00v\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x890c, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000003b40)={&(0x7f0000002240)=@xdp={0x2c, 0x0, r1, 0x3e}, 0x80, &(0x7f0000002680)=[{&(0x7f00000025c0)="744f49f009143cab4b2c41124ca5b3fbf74c4e18bc80005b74e9c2171a57f86300e82f12f1cb30e85e8305add5b73913779d7117941ed7e907d0438adf33fdae2982b595efbf1fbc601ef674d6c554d9552723d315fdbc5809fdd61410b3", 0x5e}], 0x1}, 0x0) r5 = socket$kcm(0x2, 0x1000000000000805, 0x84) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000100)=0xffffffffffffff81, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 00:51:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x27}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 00:51:40 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002200)={&(0x7f0000001ec0)=@can={0x1d, 0x0}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001f40)=""/187, 0xbb}, {&(0x7f0000002000)=""/156, 0x9c}, {0x0}, {&(0x7f0000002100)=""/179, 0xb3}], 0x4}, 0x163) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r3) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000002f00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6o\x9b\x99M\xf8\x87\x1a\xf1\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+\xdb-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\x00v\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x890c, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000003b40)={&(0x7f0000002240)=@xdp={0x2c, 0x0, r1, 0x3e}, 0x80, &(0x7f0000002680)=[{&(0x7f00000025c0)="744f49f009143cab4b2c41124ca5b3fbf74c4e18bc80005b74e9c2171a57f86300e82f12f1cb30e85e8305add5b73913779d7117941ed7e907d0438adf33fdae2982b595efbf1fbc601ef674d6c554d9552723d315fdbc5809fdd61410b3", 0x5e}], 0x1}, 0x0) r5 = socket$kcm(0x2, 0x1000000000000805, 0x84) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000100)=0xffffffffffffff81, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 00:51:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x27}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 00:51:40 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002200)={&(0x7f0000001ec0)=@can={0x1d, 0x0}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001f40)=""/187, 0xbb}, {&(0x7f0000002000)=""/156, 0x9c}, {0x0}, {&(0x7f0000002100)=""/179, 0xb3}], 0x4}, 0x163) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r3) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000002f00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6o\x9b\x99M\xf8\x87\x1a\xf1\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+\xdb-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\x00v\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x890c, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000003b40)={&(0x7f0000002240)=@xdp={0x2c, 0x0, r1, 0x3e}, 0x80, &(0x7f0000002680)=[{&(0x7f00000025c0)="744f49f009143cab4b2c41124ca5b3fbf74c4e18bc80005b74e9c2171a57f86300e82f12f1cb30e85e8305add5b73913779d7117941ed7e907d0438adf33fdae2982b595efbf1fbc601ef674d6c554d9552723d315fdbc5809fdd61410b3", 0x5e}], 0x1}, 0x0) r5 = socket$kcm(0x2, 0x1000000000000805, 0x84) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000100)=0xffffffffffffff81, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) [ 459.823420][T21673] device nr0 entered promiscuous mode 00:51:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x27}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 00:51:41 executing program 5: r0 = socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x10, 0x400800000000004, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0xfffbbffe00000003, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000b40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8e, 0x8e, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x5, 0x4}]}, @datasec={0x5, 0x2, 0x0, 0xf, 0x2, [{0x1, 0x101, 0x6}, {0x0, 0x0, 0x40}], "cfef"}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x0, 0x5}, {0x5, 0x3}, {0x6, 0x5}, {0x3, 0x4}, {}, {0x1, 0x4}]}, @volatile={0x4, 0x0, 0x0, 0x9, 0x3}, @ptr={0x4}]}, {0x0, [0x2e, 0x7f, 0x61, 0x0, 0x2e, 0x7f, 0x71]}}, 0x0, 0xb1, 0x0, 0x1}, 0x20) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000440)=""/184, 0xb8}], 0x1}, 0x10020) recvmsg(0xffffffffffffffff, 0x0, 0x0) 00:51:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x27}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 00:51:41 executing program 3: r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x1) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000500)=@nl=@unspec={0xa, 0x0, 0xf5ffffff, 0x80fe}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="d90d0700768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc85a2b1496c0c48ffff01080a2f858ad2c4aa412d", 0x48}], 0x1}, 0x0) 00:51:41 executing program 3: r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x1) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000500)=@nl=@unspec={0xa, 0x0, 0xf5ffffff, 0x80fe}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="d90d0700768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc85a2b1496c0c48ffff01080a2f858ad2c4aa412d", 0x48}], 0x1}, 0x0) [ 461.033517][T21726] device nr0 entered promiscuous mode 00:51:42 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000211fe4ac14140ceb", 0x11}], 0x1}, 0x0) 00:51:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x24, 0x4, 0x1, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) 00:51:42 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002200)={&(0x7f0000001ec0)=@can={0x1d, 0x0}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001f40)=""/187, 0xbb}, {&(0x7f0000002000)=""/156, 0x9c}, {0x0}, {&(0x7f0000002100)=""/179, 0xb3}], 0x4}, 0x163) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r3) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000002f00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6o\x9b\x99M\xf8\x87\x1a\xf1\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+\xdb-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\x00v\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x890c, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000003b40)={&(0x7f0000002240)=@xdp={0x2c, 0x0, r1, 0x3e}, 0x80, &(0x7f0000002680)=[{&(0x7f00000025c0)="744f49f009143cab4b2c41124ca5b3fbf74c4e18bc80005b74e9c2171a57f86300e82f12f1cb30e85e8305add5b73913779d7117941ed7e907d0438adf33fdae2982b595efbf1fbc601ef674d6c554d9552723d315fdbc5809fdd61410b3", 0x5e}], 0x1}, 0x0) r5 = socket$kcm(0x2, 0x1000000000000805, 0x84) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000100)=0xffffffffffffff81, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 00:51:42 executing program 1: r0 = socket$kcm(0x10, 0x2000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000280)="2e00000019008100e00f80ecdb4cb92e0ae2fffffffcfeffffbd6efb120009b2acdd51174f7d0800000000000036", 0x2e}], 0x1}, 0x0) 00:51:42 executing program 3: r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x1) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000500)=@nl=@unspec={0xa, 0x0, 0xf5ffffff, 0x80fe}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="d90d0700768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc85a2b1496c0c48ffff01080a2f858ad2c4aa412d", 0x48}], 0x1}, 0x0) 00:51:42 executing program 3: r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x1) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000500)=@nl=@unspec={0xa, 0x0, 0xf5ffffff, 0x80fe}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="d90d0700768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc85a2b1496c0c48ffff01080a2f858ad2c4aa412d", 0x48}], 0x1}, 0x0) 00:51:42 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000211fe4ac14140ceb", 0x11}], 0x1}, 0x0) 00:51:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x24, 0x4, 0x1, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) 00:51:43 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000211fe4ac14140ceb", 0x11}], 0x1}, 0x0) 00:51:43 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x24, 0x4, 0x1, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) 00:51:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x24, 0x4, 0x1, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) 00:51:43 executing program 1: r0 = socket$kcm(0x10, 0x2000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000280)="2e00000019008100e00f80ecdb4cb92e0ae2fffffffcfeffffbd6efb120009b2acdd51174f7d0800000000000036", 0x2e}], 0x1}, 0x0) 00:51:43 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000000b00)={&(0x7f0000000200)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000000a00)=""/225, 0xe1}, 0x40000001) sendmsg$kcm(r1, &(0x7f0000000fc0)={&(0x7f0000000b40)=@nfc={0x27, 0x1, 0x1, 0x4}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000bc0)="8ce63b4bae82af747fb33ab6aa53c9aa04e49442760eaf26781a7fe2a9b152318966501c27e96107da0252a427e7040ff230a8fafb37371b1ec273cab0003d8888c3c87e024282785a3adc66f9fb", 0x4e}, {&(0x7f00000005c0)="44bd0b41b05867dfbf0d790d70f55dc793eb1a69bc9ad1e17b355526de98f14279bb3edec76a6f9e3d40bc8c6271f3b337eda86e", 0x34}, {&(0x7f0000000c40)="276cb12861b8345a2df0f953aaf642af4f245c4c2eb17dcd53ab906c343f24a13240209c3835c719d19fa22672d0ef52e9a317aa5de03b4a5747758f7526bb270268ceaecf71a6d24ecee2c633a63536073f03e2e7cdfd2b92b81284e8c9a32244b42b09bf0f92b3bed766164cef33ae1a59dfb1e05cabab", 0x78}, {&(0x7f0000000d00)="b1c76829170ef23e0437e82197a5f5062d78828bc5dd539d69b957aaec5e6f6b196d68d6aa5489e13d106cad86399e60143915a8d5ca85dc177cd3594f52d26a8a4cf89f1160310b2594c8333d656dcaa81ad163ddbd679e7b2fdd5238c51cbba262c1a0ae9be5ca5f44603930d3b557562a0924d7b32a74a7eb53905d42fc9bec5fbd9bdbf95d71a6467c76aa62dae373206938831936dcd6b0b48b23bc3c546a0ff6278172cf7e5cf4c0e717b191d4718dd8740d466b986b43b656c8614ca0e19db636822162683c585d0e4aa1ae812b11c37c6f8773aa9497162e", 0xdc}, {&(0x7f0000000e00)="dbfe5fdc343424b20debd2ca3f620594572a64af33baf151cf2075874eb2230d9f055d", 0x23}, {&(0x7f0000000e40)="a6328f3378faea5d2f0bfb693956eb10907c9da846222f319ff723e93e0eff37ad176b31e027d2e07aa8c5308b2db7639090d490c0bfe12d3a74550b6803bfadba5ec852252cf9d16ad2b4133c9f2a2978b14e330ff6cf0d40b812f1901fe0550d666299b367f971fb38e66ca29f4a28716464cda2c6d9936bb01c50510215591c7136b65844bb701c5076a95d541a636fe478db63e04e5726982f0a51b85b7afdd475bb9e1a242a61fcf9e0cd81e9dab86078ede401610e8462ba352ac133a2fd40be42618666a5ecbe99ce931b838a2eb2ce9c7b7cfe408bc24bba60d9dd4d0e299a1c64876817e41fcd39", 0xec}], 0x6}, 0x1) r2 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)={r2}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) close(r5) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x200000000001) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x0, 0x2}]}, {0x0, [0x61, 0x2030]}}, &(0x7f0000000340)=""/204, 0x2c, 0xffffffffffffff63, 0x1}, 0x20) sendmsg$kcm(r4, &(0x7f0000003180)={&(0x7f00000004c0)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0x63, 0x5, "d9ae05823d4df315cb9dc2a4c251750b8988bd5215ad7c3746457bb5f9b1533cb70d15604e1a50a6605c529e7bbaa52fa6d7e03f4148b21e96810fcd4792b3", 0x21}, 0x80, 0x0, 0x0, &(0x7f0000002e40)=[{0x108, 0x112, 0xffffffffb4bf3a94, "3546135b07b93257b6b0c798efeb26becc5b20884c84ddfe9b1aa5a02b136d6847e201a4f7dd22bdaa1eb4d5f0bd0fb629f7c030ce096ead741a7c1e7a72eec012a7663836008681526a50035104112a052faedcfd686da18d44d8511c6e47f0d18d05c366f5060602d680e6670a9aa7084771259e522a3b6267060f1d556716497a7bbc3d21d2b751ce74ba108998883468bdd22a6b8b5e696f902c07ab64e899610fdac1e900f94ebdc60a38ff66909c47eccbeb2e0d1cf5a23be1cc8b5344c5b8fdc1cdf52a6596faccf3b0448948122bd48084e5d187f60de0e5cc02c8ebd1d5e0f5b035da3b85cc63f375eb087a6744ab9fec429a35"}], 0x108}, 0x8040) r8 = gettid() perf_event_open(&(0x7f0000001000)={0x4, 0x70, 0x0, 0x9, 0x5, 0x10001, 0x0, 0x3, 0x4000, 0x3, 0x8, 0x9, 0x4, 0x400, 0x6f9, 0x8, 0x6, 0x7, 0xa000000, 0x8, 0x8, 0xc2b, 0xb1, 0x6998, 0x5, 0x0, 0xaf10, 0x1, 0x2, 0x6, 0x4, 0x6, 0x4, 0x6, 0x54e, 0x400, 0x7, 0x40000000000000, 0x0, 0x4, 0x4, @perf_config_ext={0x1000, 0x112c}, 0x0, 0x8000, 0x9, 0x5, 0x1f, 0x5000000000000, 0x3}, r8, 0x3, r7, 0x1) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000300)=r3, 0x4) 00:51:43 executing program 1: r0 = socket$kcm(0x10, 0x2000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000280)="2e00000019008100e00f80ecdb4cb92e0ae2fffffffcfeffffbd6efb120009b2acdd51174f7d0800000000000036", 0x2e}], 0x1}, 0x0) [ 462.044781][T21784] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 00:51:43 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002200)={&(0x7f0000001ec0)=@can={0x1d, 0x0}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001f40)=""/187, 0xbb}, {&(0x7f0000002000)=""/156, 0x9c}, {0x0}, {&(0x7f0000002100)=""/179, 0xb3}], 0x4}, 0x163) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r3) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000002f00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6o\x9b\x99M\xf8\x87\x1a\xf1\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+\xdb-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\x00v\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x890c, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000003b40)={&(0x7f0000002240)=@xdp={0x2c, 0x0, r1, 0x3e}, 0x80, &(0x7f0000002680)=[{&(0x7f00000025c0)="744f49f009143cab4b2c41124ca5b3fbf74c4e18bc80005b74e9c2171a57f86300e82f12f1cb30e85e8305add5b73913779d7117941ed7e907d0438adf33fdae2982b595efbf1fbc601ef674d6c554d9552723d315fdbc5809fdd61410b3", 0x5e}], 0x1}, 0x0) r5 = socket$kcm(0x2, 0x1000000000000805, 0x84) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000100)=0xffffffffffffff81, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 00:51:43 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x24, 0x4, 0x1, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) 00:51:43 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000211fe4ac14140ceb", 0x11}], 0x1}, 0x0) 00:51:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x24, 0x4, 0x1, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) 00:51:43 executing program 1: r0 = socket$kcm(0x10, 0x2000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000280)="2e00000019008100e00f80ecdb4cb92e0ae2fffffffcfeffffbd6efb120009b2acdd51174f7d0800000000000036", 0x2e}], 0x1}, 0x0) 00:51:43 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) 00:51:43 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x26, 0xed, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="850000000500000054000000000000009500fd00000000004a9642a22fbde5c3c88efb1812cff152c0ecee3441493ad263d9813c9f870e124b095744d9cb410069910a86c9690565a5588b1d"], &(0x7f0000005c40)='GPL\x00', 0x1, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x8, r0, 0x8, &(0x7f0000000000), 0x1, 0x10, &(0x7f0000000000)={0x0, 0xa0018000}, 0x10}, 0x70) 00:51:43 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x24, 0x4, 0x1, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) 00:51:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f00000004c0), 0x66ec7bcc) sendmsg$inet(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x4e20}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x0, [{0x0, 0x2}]}]}}}], 0x18}, 0x0) 00:51:43 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x26, 0xed, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="850000000500000054000000000000009500fd00000000004a9642a22fbde5c3c88efb1812cff152c0ecee3441493ad263d9813c9f870e124b095744d9cb410069910a86c9690565a5588b1d"], &(0x7f0000005c40)='GPL\x00', 0x1, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x8, r0, 0x8, &(0x7f0000000000), 0x1, 0x10, &(0x7f0000000000)={0x0, 0xa0018000}, 0x10}, 0x70) [ 462.526823][T21810] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 462.554374][ C0] net_ratelimit: 4 callbacks suppressed [ 462.554388][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 462.565811][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:51:43 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000000b00)={&(0x7f0000000200)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000000a00)=""/225, 0xe1}, 0x40000001) sendmsg$kcm(r1, &(0x7f0000000fc0)={&(0x7f0000000b40)=@nfc={0x27, 0x1, 0x1, 0x4}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000bc0)="8ce63b4bae82af747fb33ab6aa53c9aa04e49442760eaf26781a7fe2a9b152318966501c27e96107da0252a427e7040ff230a8fafb37371b1ec273cab0003d8888c3c87e024282785a3adc66f9fb", 0x4e}, {&(0x7f00000005c0)="44bd0b41b05867dfbf0d790d70f55dc793eb1a69bc9ad1e17b355526de98f14279bb3edec76a6f9e3d40bc8c6271f3b337eda86e", 0x34}, {&(0x7f0000000c40)="276cb12861b8345a2df0f953aaf642af4f245c4c2eb17dcd53ab906c343f24a13240209c3835c719d19fa22672d0ef52e9a317aa5de03b4a5747758f7526bb270268ceaecf71a6d24ecee2c633a63536073f03e2e7cdfd2b92b81284e8c9a32244b42b09bf0f92b3bed766164cef33ae1a59dfb1e05cabab", 0x78}, {&(0x7f0000000d00)="b1c76829170ef23e0437e82197a5f5062d78828bc5dd539d69b957aaec5e6f6b196d68d6aa5489e13d106cad86399e60143915a8d5ca85dc177cd3594f52d26a8a4cf89f1160310b2594c8333d656dcaa81ad163ddbd679e7b2fdd5238c51cbba262c1a0ae9be5ca5f44603930d3b557562a0924d7b32a74a7eb53905d42fc9bec5fbd9bdbf95d71a6467c76aa62dae373206938831936dcd6b0b48b23bc3c546a0ff6278172cf7e5cf4c0e717b191d4718dd8740d466b986b43b656c8614ca0e19db636822162683c585d0e4aa1ae812b11c37c6f8773aa9497162e", 0xdc}, {&(0x7f0000000e00)="dbfe5fdc343424b20debd2ca3f620594572a64af33baf151cf2075874eb2230d9f055d", 0x23}, {&(0x7f0000000e40)="a6328f3378faea5d2f0bfb693956eb10907c9da846222f319ff723e93e0eff37ad176b31e027d2e07aa8c5308b2db7639090d490c0bfe12d3a74550b6803bfadba5ec852252cf9d16ad2b4133c9f2a2978b14e330ff6cf0d40b812f1901fe0550d666299b367f971fb38e66ca29f4a28716464cda2c6d9936bb01c50510215591c7136b65844bb701c5076a95d541a636fe478db63e04e5726982f0a51b85b7afdd475bb9e1a242a61fcf9e0cd81e9dab86078ede401610e8462ba352ac133a2fd40be42618666a5ecbe99ce931b838a2eb2ce9c7b7cfe408bc24bba60d9dd4d0e299a1c64876817e41fcd39", 0xec}], 0x6}, 0x1) r2 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)={r2}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) close(r5) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x200000000001) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x0, 0x2}]}, {0x0, [0x61, 0x2030]}}, &(0x7f0000000340)=""/204, 0x2c, 0xffffffffffffff63, 0x1}, 0x20) sendmsg$kcm(r4, &(0x7f0000003180)={&(0x7f00000004c0)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0x63, 0x5, "d9ae05823d4df315cb9dc2a4c251750b8988bd5215ad7c3746457bb5f9b1533cb70d15604e1a50a6605c529e7bbaa52fa6d7e03f4148b21e96810fcd4792b3", 0x21}, 0x80, 0x0, 0x0, &(0x7f0000002e40)=[{0x108, 0x112, 0xffffffffb4bf3a94, "3546135b07b93257b6b0c798efeb26becc5b20884c84ddfe9b1aa5a02b136d6847e201a4f7dd22bdaa1eb4d5f0bd0fb629f7c030ce096ead741a7c1e7a72eec012a7663836008681526a50035104112a052faedcfd686da18d44d8511c6e47f0d18d05c366f5060602d680e6670a9aa7084771259e522a3b6267060f1d556716497a7bbc3d21d2b751ce74ba108998883468bdd22a6b8b5e696f902c07ab64e899610fdac1e900f94ebdc60a38ff66909c47eccbeb2e0d1cf5a23be1cc8b5344c5b8fdc1cdf52a6596faccf3b0448948122bd48084e5d187f60de0e5cc02c8ebd1d5e0f5b035da3b85cc63f375eb087a6744ab9fec429a35"}], 0x108}, 0x8040) r8 = gettid() perf_event_open(&(0x7f0000001000)={0x4, 0x70, 0x0, 0x9, 0x5, 0x10001, 0x0, 0x3, 0x4000, 0x3, 0x8, 0x9, 0x4, 0x400, 0x6f9, 0x8, 0x6, 0x7, 0xa000000, 0x8, 0x8, 0xc2b, 0xb1, 0x6998, 0x5, 0x0, 0xaf10, 0x1, 0x2, 0x6, 0x4, 0x6, 0x4, 0x6, 0x54e, 0x400, 0x7, 0x40000000000000, 0x0, 0x4, 0x4, @perf_config_ext={0x1000, 0x112c}, 0x0, 0x8000, 0x9, 0x5, 0x1f, 0x5000000000000, 0x3}, r8, 0x3, r7, 0x1) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000300)=r3, 0x4) 00:51:43 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) [ 462.954229][T21837] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 00:51:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) 00:51:44 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x26, 0xed, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="850000000500000054000000000000009500fd00000000004a9642a22fbde5c3c88efb1812cff152c0ecee3441493ad263d9813c9f870e124b095744d9cb410069910a86c9690565a5588b1d"], &(0x7f0000005c40)='GPL\x00', 0x1, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x8, r0, 0x8, &(0x7f0000000000), 0x1, 0x10, &(0x7f0000000000)={0x0, 0xa0018000}, 0x10}, 0x70) 00:51:44 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x448, &(0x7f00000015c0)=[{&(0x7f0000000000)="fb00000024000102bfa9d345e7eb8dfe204ee2d70800000000000100f1ffffff801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e7aab6489978112322628c7a1fbab650cdc797d32d3524ea85b198cb44a83c011d2572f9291431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a86105ea0ddbad539ef278168ac8d157a6366ccec93f9fb8f100437172ff070000000021002683d489e1cadfd1a06f9900"/251, 0xfb}], 0x1}, 0x0) 00:51:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f00000004c0), 0x66ec7bcc) sendmsg$inet(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x4e20}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x0, [{0x0, 0x2}]}]}}}], 0x18}, 0x0) 00:51:44 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000000b00)={&(0x7f0000000200)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000000a00)=""/225, 0xe1}, 0x40000001) sendmsg$kcm(r1, &(0x7f0000000fc0)={&(0x7f0000000b40)=@nfc={0x27, 0x1, 0x1, 0x4}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000bc0)="8ce63b4bae82af747fb33ab6aa53c9aa04e49442760eaf26781a7fe2a9b152318966501c27e96107da0252a427e7040ff230a8fafb37371b1ec273cab0003d8888c3c87e024282785a3adc66f9fb", 0x4e}, {&(0x7f00000005c0)="44bd0b41b05867dfbf0d790d70f55dc793eb1a69bc9ad1e17b355526de98f14279bb3edec76a6f9e3d40bc8c6271f3b337eda86e", 0x34}, {&(0x7f0000000c40)="276cb12861b8345a2df0f953aaf642af4f245c4c2eb17dcd53ab906c343f24a13240209c3835c719d19fa22672d0ef52e9a317aa5de03b4a5747758f7526bb270268ceaecf71a6d24ecee2c633a63536073f03e2e7cdfd2b92b81284e8c9a32244b42b09bf0f92b3bed766164cef33ae1a59dfb1e05cabab", 0x78}, {&(0x7f0000000d00)="b1c76829170ef23e0437e82197a5f5062d78828bc5dd539d69b957aaec5e6f6b196d68d6aa5489e13d106cad86399e60143915a8d5ca85dc177cd3594f52d26a8a4cf89f1160310b2594c8333d656dcaa81ad163ddbd679e7b2fdd5238c51cbba262c1a0ae9be5ca5f44603930d3b557562a0924d7b32a74a7eb53905d42fc9bec5fbd9bdbf95d71a6467c76aa62dae373206938831936dcd6b0b48b23bc3c546a0ff6278172cf7e5cf4c0e717b191d4718dd8740d466b986b43b656c8614ca0e19db636822162683c585d0e4aa1ae812b11c37c6f8773aa9497162e", 0xdc}, {&(0x7f0000000e00)="dbfe5fdc343424b20debd2ca3f620594572a64af33baf151cf2075874eb2230d9f055d", 0x23}, {&(0x7f0000000e40)="a6328f3378faea5d2f0bfb693956eb10907c9da846222f319ff723e93e0eff37ad176b31e027d2e07aa8c5308b2db7639090d490c0bfe12d3a74550b6803bfadba5ec852252cf9d16ad2b4133c9f2a2978b14e330ff6cf0d40b812f1901fe0550d666299b367f971fb38e66ca29f4a28716464cda2c6d9936bb01c50510215591c7136b65844bb701c5076a95d541a636fe478db63e04e5726982f0a51b85b7afdd475bb9e1a242a61fcf9e0cd81e9dab86078ede401610e8462ba352ac133a2fd40be42618666a5ecbe99ce931b838a2eb2ce9c7b7cfe408bc24bba60d9dd4d0e299a1c64876817e41fcd39", 0xec}], 0x6}, 0x1) r2 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)={r2}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) close(r5) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x200000000001) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x0, 0x2}]}, {0x0, [0x61, 0x2030]}}, &(0x7f0000000340)=""/204, 0x2c, 0xffffffffffffff63, 0x1}, 0x20) sendmsg$kcm(r4, &(0x7f0000003180)={&(0x7f00000004c0)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0x63, 0x5, "d9ae05823d4df315cb9dc2a4c251750b8988bd5215ad7c3746457bb5f9b1533cb70d15604e1a50a6605c529e7bbaa52fa6d7e03f4148b21e96810fcd4792b3", 0x21}, 0x80, 0x0, 0x0, &(0x7f0000002e40)=[{0x108, 0x112, 0xffffffffb4bf3a94, "3546135b07b93257b6b0c798efeb26becc5b20884c84ddfe9b1aa5a02b136d6847e201a4f7dd22bdaa1eb4d5f0bd0fb629f7c030ce096ead741a7c1e7a72eec012a7663836008681526a50035104112a052faedcfd686da18d44d8511c6e47f0d18d05c366f5060602d680e6670a9aa7084771259e522a3b6267060f1d556716497a7bbc3d21d2b751ce74ba108998883468bdd22a6b8b5e696f902c07ab64e899610fdac1e900f94ebdc60a38ff66909c47eccbeb2e0d1cf5a23be1cc8b5344c5b8fdc1cdf52a6596faccf3b0448948122bd48084e5d187f60de0e5cc02c8ebd1d5e0f5b035da3b85cc63f375eb087a6744ab9fec429a35"}], 0x108}, 0x8040) r8 = gettid() perf_event_open(&(0x7f0000001000)={0x4, 0x70, 0x0, 0x9, 0x5, 0x10001, 0x0, 0x3, 0x4000, 0x3, 0x8, 0x9, 0x4, 0x400, 0x6f9, 0x8, 0x6, 0x7, 0xa000000, 0x8, 0x8, 0xc2b, 0xb1, 0x6998, 0x5, 0x0, 0xaf10, 0x1, 0x2, 0x6, 0x4, 0x6, 0x4, 0x6, 0x54e, 0x400, 0x7, 0x40000000000000, 0x0, 0x4, 0x4, @perf_config_ext={0x1000, 0x112c}, 0x0, 0x8000, 0x9, 0x5, 0x1f, 0x5000000000000, 0x3}, r8, 0x3, r7, 0x1) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000300)=r3, 0x4) [ 463.242103][T21842] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 00:51:44 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000000b00)={&(0x7f0000000200)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000000a00)=""/225, 0xe1}, 0x40000001) sendmsg$kcm(r1, &(0x7f0000000fc0)={&(0x7f0000000b40)=@nfc={0x27, 0x1, 0x1, 0x4}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000bc0)="8ce63b4bae82af747fb33ab6aa53c9aa04e49442760eaf26781a7fe2a9b152318966501c27e96107da0252a427e7040ff230a8fafb37371b1ec273cab0003d8888c3c87e024282785a3adc66f9fb", 0x4e}, {&(0x7f00000005c0)="44bd0b41b05867dfbf0d790d70f55dc793eb1a69bc9ad1e17b355526de98f14279bb3edec76a6f9e3d40bc8c6271f3b337eda86e", 0x34}, {&(0x7f0000000c40)="276cb12861b8345a2df0f953aaf642af4f245c4c2eb17dcd53ab906c343f24a13240209c3835c719d19fa22672d0ef52e9a317aa5de03b4a5747758f7526bb270268ceaecf71a6d24ecee2c633a63536073f03e2e7cdfd2b92b81284e8c9a32244b42b09bf0f92b3bed766164cef33ae1a59dfb1e05cabab", 0x78}, {&(0x7f0000000d00)="b1c76829170ef23e0437e82197a5f5062d78828bc5dd539d69b957aaec5e6f6b196d68d6aa5489e13d106cad86399e60143915a8d5ca85dc177cd3594f52d26a8a4cf89f1160310b2594c8333d656dcaa81ad163ddbd679e7b2fdd5238c51cbba262c1a0ae9be5ca5f44603930d3b557562a0924d7b32a74a7eb53905d42fc9bec5fbd9bdbf95d71a6467c76aa62dae373206938831936dcd6b0b48b23bc3c546a0ff6278172cf7e5cf4c0e717b191d4718dd8740d466b986b43b656c8614ca0e19db636822162683c585d0e4aa1ae812b11c37c6f8773aa9497162e", 0xdc}, {&(0x7f0000000e00)="dbfe5fdc343424b20debd2ca3f620594572a64af33baf151cf2075874eb2230d9f055d", 0x23}, {&(0x7f0000000e40)="a6328f3378faea5d2f0bfb693956eb10907c9da846222f319ff723e93e0eff37ad176b31e027d2e07aa8c5308b2db7639090d490c0bfe12d3a74550b6803bfadba5ec852252cf9d16ad2b4133c9f2a2978b14e330ff6cf0d40b812f1901fe0550d666299b367f971fb38e66ca29f4a28716464cda2c6d9936bb01c50510215591c7136b65844bb701c5076a95d541a636fe478db63e04e5726982f0a51b85b7afdd475bb9e1a242a61fcf9e0cd81e9dab86078ede401610e8462ba352ac133a2fd40be42618666a5ecbe99ce931b838a2eb2ce9c7b7cfe408bc24bba60d9dd4d0e299a1c64876817e41fcd39", 0xec}], 0x6}, 0x1) r2 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)={r2}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) close(r5) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x200000000001) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x0, 0x2}]}, {0x0, [0x61, 0x2030]}}, &(0x7f0000000340)=""/204, 0x2c, 0xffffffffffffff63, 0x1}, 0x20) sendmsg$kcm(r4, &(0x7f0000003180)={&(0x7f00000004c0)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0x63, 0x5, "d9ae05823d4df315cb9dc2a4c251750b8988bd5215ad7c3746457bb5f9b1533cb70d15604e1a50a6605c529e7bbaa52fa6d7e03f4148b21e96810fcd4792b3", 0x21}, 0x80, 0x0, 0x0, &(0x7f0000002e40)=[{0x108, 0x112, 0xffffffffb4bf3a94, "3546135b07b93257b6b0c798efeb26becc5b20884c84ddfe9b1aa5a02b136d6847e201a4f7dd22bdaa1eb4d5f0bd0fb629f7c030ce096ead741a7c1e7a72eec012a7663836008681526a50035104112a052faedcfd686da18d44d8511c6e47f0d18d05c366f5060602d680e6670a9aa7084771259e522a3b6267060f1d556716497a7bbc3d21d2b751ce74ba108998883468bdd22a6b8b5e696f902c07ab64e899610fdac1e900f94ebdc60a38ff66909c47eccbeb2e0d1cf5a23be1cc8b5344c5b8fdc1cdf52a6596faccf3b0448948122bd48084e5d187f60de0e5cc02c8ebd1d5e0f5b035da3b85cc63f375eb087a6744ab9fec429a35"}], 0x108}, 0x8040) r8 = gettid() perf_event_open(&(0x7f0000001000)={0x4, 0x70, 0x0, 0x9, 0x5, 0x10001, 0x0, 0x3, 0x4000, 0x3, 0x8, 0x9, 0x4, 0x400, 0x6f9, 0x8, 0x6, 0x7, 0xa000000, 0x8, 0x8, 0xc2b, 0xb1, 0x6998, 0x5, 0x0, 0xaf10, 0x1, 0x2, 0x6, 0x4, 0x6, 0x4, 0x6, 0x54e, 0x400, 0x7, 0x40000000000000, 0x0, 0x4, 0x4, @perf_config_ext={0x1000, 0x112c}, 0x0, 0x8000, 0x9, 0x5, 0x1f, 0x5000000000000, 0x3}, r8, 0x3, r7, 0x1) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000300)=r3, 0x4) 00:51:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f00000004c0), 0x66ec7bcc) sendmsg$inet(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x4e20}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x0, [{0x0, 0x2}]}]}}}], 0x18}, 0x0) 00:51:44 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x26, 0xed, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="850000000500000054000000000000009500fd00000000004a9642a22fbde5c3c88efb1812cff152c0ecee3441493ad263d9813c9f870e124b095744d9cb410069910a86c9690565a5588b1d"], &(0x7f0000005c40)='GPL\x00', 0x1, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x8, r0, 0x8, &(0x7f0000000000), 0x1, 0x10, &(0x7f0000000000)={0x0, 0xa0018000}, 0x10}, 0x70) [ 463.354969][T21850] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 00:51:44 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x448, &(0x7f00000015c0)=[{&(0x7f0000000000)="fb00000024000102bfa9d345e7eb8dfe204ee2d70800000000000100f1ffffff801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e7aab6489978112322628c7a1fbab650cdc797d32d3524ea85b198cb44a83c011d2572f9291431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a86105ea0ddbad539ef278168ac8d157a6366ccec93f9fb8f100437172ff070000000021002683d489e1cadfd1a06f9900"/251, 0xfb}], 0x1}, 0x0) 00:51:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) [ 463.514380][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 463.514414][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 463.520189][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:51:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f00000004c0), 0x66ec7bcc) sendmsg$inet(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x4e20}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x0, [{0x0, 0x2}]}]}}}], 0x18}, 0x0) 00:51:44 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000000b00)={&(0x7f0000000200)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000000a00)=""/225, 0xe1}, 0x40000001) sendmsg$kcm(r1, &(0x7f0000000fc0)={&(0x7f0000000b40)=@nfc={0x27, 0x1, 0x1, 0x4}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000bc0)="8ce63b4bae82af747fb33ab6aa53c9aa04e49442760eaf26781a7fe2a9b152318966501c27e96107da0252a427e7040ff230a8fafb37371b1ec273cab0003d8888c3c87e024282785a3adc66f9fb", 0x4e}, {&(0x7f00000005c0)="44bd0b41b05867dfbf0d790d70f55dc793eb1a69bc9ad1e17b355526de98f14279bb3edec76a6f9e3d40bc8c6271f3b337eda86e", 0x34}, {&(0x7f0000000c40)="276cb12861b8345a2df0f953aaf642af4f245c4c2eb17dcd53ab906c343f24a13240209c3835c719d19fa22672d0ef52e9a317aa5de03b4a5747758f7526bb270268ceaecf71a6d24ecee2c633a63536073f03e2e7cdfd2b92b81284e8c9a32244b42b09bf0f92b3bed766164cef33ae1a59dfb1e05cabab", 0x78}, {&(0x7f0000000d00)="b1c76829170ef23e0437e82197a5f5062d78828bc5dd539d69b957aaec5e6f6b196d68d6aa5489e13d106cad86399e60143915a8d5ca85dc177cd3594f52d26a8a4cf89f1160310b2594c8333d656dcaa81ad163ddbd679e7b2fdd5238c51cbba262c1a0ae9be5ca5f44603930d3b557562a0924d7b32a74a7eb53905d42fc9bec5fbd9bdbf95d71a6467c76aa62dae373206938831936dcd6b0b48b23bc3c546a0ff6278172cf7e5cf4c0e717b191d4718dd8740d466b986b43b656c8614ca0e19db636822162683c585d0e4aa1ae812b11c37c6f8773aa9497162e", 0xdc}, {&(0x7f0000000e00)="dbfe5fdc343424b20debd2ca3f620594572a64af33baf151cf2075874eb2230d9f055d", 0x23}, {&(0x7f0000000e40)="a6328f3378faea5d2f0bfb693956eb10907c9da846222f319ff723e93e0eff37ad176b31e027d2e07aa8c5308b2db7639090d490c0bfe12d3a74550b6803bfadba5ec852252cf9d16ad2b4133c9f2a2978b14e330ff6cf0d40b812f1901fe0550d666299b367f971fb38e66ca29f4a28716464cda2c6d9936bb01c50510215591c7136b65844bb701c5076a95d541a636fe478db63e04e5726982f0a51b85b7afdd475bb9e1a242a61fcf9e0cd81e9dab86078ede401610e8462ba352ac133a2fd40be42618666a5ecbe99ce931b838a2eb2ce9c7b7cfe408bc24bba60d9dd4d0e299a1c64876817e41fcd39", 0xec}], 0x6}, 0x1) r2 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)={r2}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) close(r5) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x200000000001) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x0, 0x2}]}, {0x0, [0x61, 0x2030]}}, &(0x7f0000000340)=""/204, 0x2c, 0xffffffffffffff63, 0x1}, 0x20) sendmsg$kcm(r4, &(0x7f0000003180)={&(0x7f00000004c0)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0x63, 0x5, "d9ae05823d4df315cb9dc2a4c251750b8988bd5215ad7c3746457bb5f9b1533cb70d15604e1a50a6605c529e7bbaa52fa6d7e03f4148b21e96810fcd4792b3", 0x21}, 0x80, 0x0, 0x0, &(0x7f0000002e40)=[{0x108, 0x112, 0xffffffffb4bf3a94, "3546135b07b93257b6b0c798efeb26becc5b20884c84ddfe9b1aa5a02b136d6847e201a4f7dd22bdaa1eb4d5f0bd0fb629f7c030ce096ead741a7c1e7a72eec012a7663836008681526a50035104112a052faedcfd686da18d44d8511c6e47f0d18d05c366f5060602d680e6670a9aa7084771259e522a3b6267060f1d556716497a7bbc3d21d2b751ce74ba108998883468bdd22a6b8b5e696f902c07ab64e899610fdac1e900f94ebdc60a38ff66909c47eccbeb2e0d1cf5a23be1cc8b5344c5b8fdc1cdf52a6596faccf3b0448948122bd48084e5d187f60de0e5cc02c8ebd1d5e0f5b035da3b85cc63f375eb087a6744ab9fec429a35"}], 0x108}, 0x8040) r8 = gettid() perf_event_open(&(0x7f0000001000)={0x4, 0x70, 0x0, 0x9, 0x5, 0x10001, 0x0, 0x3, 0x4000, 0x3, 0x8, 0x9, 0x4, 0x400, 0x6f9, 0x8, 0x6, 0x7, 0xa000000, 0x8, 0x8, 0xc2b, 0xb1, 0x6998, 0x5, 0x0, 0xaf10, 0x1, 0x2, 0x6, 0x4, 0x6, 0x4, 0x6, 0x54e, 0x400, 0x7, 0x40000000000000, 0x0, 0x4, 0x4, @perf_config_ext={0x1000, 0x112c}, 0x0, 0x8000, 0x9, 0x5, 0x1f, 0x5000000000000, 0x3}, r8, 0x3, r7, 0x1) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000300)=r3, 0x4) 00:51:44 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x0, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={0x0, 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 463.776239][T21867] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 463.788222][T21854] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 463.834847][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 463.840650][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:51:45 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x448, &(0x7f00000015c0)=[{&(0x7f0000000000)="fb00000024000102bfa9d345e7eb8dfe204ee2d70800000000000100f1ffffff801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e7aab6489978112322628c7a1fbab650cdc797d32d3524ea85b198cb44a83c011d2572f9291431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a86105ea0ddbad539ef278168ac8d157a6366ccec93f9fb8f100437172ff070000000021002683d489e1cadfd1a06f9900"/251, 0xfb}], 0x1}, 0x0) 00:51:45 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000000b00)={&(0x7f0000000200)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000000a00)=""/225, 0xe1}, 0x40000001) sendmsg$kcm(r1, &(0x7f0000000fc0)={&(0x7f0000000b40)=@nfc={0x27, 0x1, 0x1, 0x4}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000bc0)="8ce63b4bae82af747fb33ab6aa53c9aa04e49442760eaf26781a7fe2a9b152318966501c27e96107da0252a427e7040ff230a8fafb37371b1ec273cab0003d8888c3c87e024282785a3adc66f9fb", 0x4e}, {&(0x7f00000005c0)="44bd0b41b05867dfbf0d790d70f55dc793eb1a69bc9ad1e17b355526de98f14279bb3edec76a6f9e3d40bc8c6271f3b337eda86e", 0x34}, {&(0x7f0000000c40)="276cb12861b8345a2df0f953aaf642af4f245c4c2eb17dcd53ab906c343f24a13240209c3835c719d19fa22672d0ef52e9a317aa5de03b4a5747758f7526bb270268ceaecf71a6d24ecee2c633a63536073f03e2e7cdfd2b92b81284e8c9a32244b42b09bf0f92b3bed766164cef33ae1a59dfb1e05cabab", 0x78}, {&(0x7f0000000d00)="b1c76829170ef23e0437e82197a5f5062d78828bc5dd539d69b957aaec5e6f6b196d68d6aa5489e13d106cad86399e60143915a8d5ca85dc177cd3594f52d26a8a4cf89f1160310b2594c8333d656dcaa81ad163ddbd679e7b2fdd5238c51cbba262c1a0ae9be5ca5f44603930d3b557562a0924d7b32a74a7eb53905d42fc9bec5fbd9bdbf95d71a6467c76aa62dae373206938831936dcd6b0b48b23bc3c546a0ff6278172cf7e5cf4c0e717b191d4718dd8740d466b986b43b656c8614ca0e19db636822162683c585d0e4aa1ae812b11c37c6f8773aa9497162e", 0xdc}, {&(0x7f0000000e00)="dbfe5fdc343424b20debd2ca3f620594572a64af33baf151cf2075874eb2230d9f055d", 0x23}, {&(0x7f0000000e40)="a6328f3378faea5d2f0bfb693956eb10907c9da846222f319ff723e93e0eff37ad176b31e027d2e07aa8c5308b2db7639090d490c0bfe12d3a74550b6803bfadba5ec852252cf9d16ad2b4133c9f2a2978b14e330ff6cf0d40b812f1901fe0550d666299b367f971fb38e66ca29f4a28716464cda2c6d9936bb01c50510215591c7136b65844bb701c5076a95d541a636fe478db63e04e5726982f0a51b85b7afdd475bb9e1a242a61fcf9e0cd81e9dab86078ede401610e8462ba352ac133a2fd40be42618666a5ecbe99ce931b838a2eb2ce9c7b7cfe408bc24bba60d9dd4d0e299a1c64876817e41fcd39", 0xec}], 0x6}, 0x1) r2 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)={r2}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) close(r5) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x200000000001) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x0, 0x2}]}, {0x0, [0x61, 0x2030]}}, &(0x7f0000000340)=""/204, 0x2c, 0xffffffffffffff63, 0x1}, 0x20) sendmsg$kcm(r4, &(0x7f0000003180)={&(0x7f00000004c0)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0x63, 0x5, "d9ae05823d4df315cb9dc2a4c251750b8988bd5215ad7c3746457bb5f9b1533cb70d15604e1a50a6605c529e7bbaa52fa6d7e03f4148b21e96810fcd4792b3", 0x21}, 0x80, 0x0, 0x0, &(0x7f0000002e40)=[{0x108, 0x112, 0xffffffffb4bf3a94, "3546135b07b93257b6b0c798efeb26becc5b20884c84ddfe9b1aa5a02b136d6847e201a4f7dd22bdaa1eb4d5f0bd0fb629f7c030ce096ead741a7c1e7a72eec012a7663836008681526a50035104112a052faedcfd686da18d44d8511c6e47f0d18d05c366f5060602d680e6670a9aa7084771259e522a3b6267060f1d556716497a7bbc3d21d2b751ce74ba108998883468bdd22a6b8b5e696f902c07ab64e899610fdac1e900f94ebdc60a38ff66909c47eccbeb2e0d1cf5a23be1cc8b5344c5b8fdc1cdf52a6596faccf3b0448948122bd48084e5d187f60de0e5cc02c8ebd1d5e0f5b035da3b85cc63f375eb087a6744ab9fec429a35"}], 0x108}, 0x8040) r8 = gettid() perf_event_open(&(0x7f0000001000)={0x4, 0x70, 0x0, 0x9, 0x5, 0x10001, 0x0, 0x3, 0x4000, 0x3, 0x8, 0x9, 0x4, 0x400, 0x6f9, 0x8, 0x6, 0x7, 0xa000000, 0x8, 0x8, 0xc2b, 0xb1, 0x6998, 0x5, 0x0, 0xaf10, 0x1, 0x2, 0x6, 0x4, 0x6, 0x4, 0x6, 0x54e, 0x400, 0x7, 0x40000000000000, 0x0, 0x4, 0x4, @perf_config_ext={0x1000, 0x112c}, 0x0, 0x8000, 0x9, 0x5, 0x1f, 0x5000000000000, 0x3}, r8, 0x3, r7, 0x1) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000300)=r3, 0x4) 00:51:45 executing program 1: sendmsg(0xffffffffffffffff, 0x0, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) [ 463.914397][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 463.920220][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 463.974176][T21876] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 464.152944][T21886] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 464.159320][T21873] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 00:51:45 executing program 1: sendmsg(0xffffffffffffffff, 0x0, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) [ 464.265721][T21876] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 464.324523][T21876] CPU: 1 PID: 21876 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #0 [ 464.332450][T21876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.342503][T21876] Call Trace: [ 464.342527][T21876] dump_stack+0x172/0x1f0 [ 464.342546][T21876] dump_header+0x10b/0x82d [ 464.342564][T21876] oom_kill_process.cold+0x10/0x15 [ 464.342586][T21876] out_of_memory+0x79a/0x12c0 [ 464.364354][T21876] ? __sched_text_start+0x8/0x8 [ 464.369225][T21876] ? oom_killer_disable+0x280/0x280 [ 464.374442][T21876] mem_cgroup_out_of_memory+0x1d8/0x240 [ 464.379998][T21876] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 464.385662][T21876] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 464.391482][T21876] ? cgroup_file_notify+0x140/0x1b0 [ 464.396700][T21876] memory_max_write+0x262/0x3a0 [ 464.401565][T21876] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 464.408347][T21876] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 464.413904][T21876] cgroup_file_write+0x241/0x790 [ 464.413927][T21876] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 464.413943][T21876] ? cgroup_migrate_add_task+0x890/0x890 [ 464.413962][T21876] ? kernfs_ops+0x9f/0x110 [ 464.413980][T21876] ? cgroup_migrate_add_task+0x890/0x890 [ 464.414000][T21876] kernfs_fop_write+0x2b8/0x480 [ 464.414017][T21876] __vfs_write+0x8a/0x110 [ 464.414026][T21876] ? kernfs_fop_open+0xd80/0xd80 [ 464.414039][T21876] vfs_write+0x268/0x5d0 [ 464.414054][T21876] ksys_write+0x14f/0x290 [ 464.425864][T21876] ? __ia32_sys_read+0xb0/0xb0 [ 464.425884][T21876] ? do_syscall_64+0x26/0x6a0 [ 464.425901][T21876] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 464.425915][T21876] ? do_syscall_64+0x26/0x6a0 [ 464.425934][T21876] __x64_sys_write+0x73/0xb0 [ 464.425951][T21876] do_syscall_64+0xfd/0x6a0 [ 464.425970][T21876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 464.425983][T21876] RIP: 0033:0x459879 [ 464.426001][T21876] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 464.426007][T21876] RSP: 002b:00007f9d85e92c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 464.426020][T21876] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459879 [ 464.441752][T21876] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 464.441762][T21876] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 464.441770][T21876] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9d85e936d4 [ 464.441779][T21876] R13: 00000000004c9a03 R14: 00000000004e10c8 R15: 00000000ffffffff [ 464.470028][T21876] memory: usage 6388kB, limit 0kB, failcnt 20 [ 464.481237][T21876] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 464.494428][T21876] Memory cgroup stats for /syz0: [ 464.495002][T21876] anon 2105344 [ 464.495002][T21876] file 540672 [ 464.495002][T21876] kernel_stack 0 [ 464.495002][T21876] slab 3796992 [ 464.495002][T21876] sock 0 [ 464.495002][T21876] shmem 348160 [ 464.495002][T21876] file_mapped 0 [ 464.495002][T21876] file_dirty 0 [ 464.495002][T21876] file_writeback 0 [ 464.495002][T21876] anon_thp 2097152 [ 464.495002][T21876] inactive_anon 540672 [ 464.495002][T21876] active_anon 2105344 [ 464.495002][T21876] inactive_file 135168 [ 464.495002][T21876] active_file 0 [ 464.495002][T21876] unevictable 0 [ 464.495002][T21876] slab_reclaimable 1757184 [ 464.495002][T21876] slab_unreclaimable 2039808 [ 464.495002][T21876] pgfault 40326 [ 464.495002][T21876] pgmajfault 0 [ 464.495002][T21876] workingset_refault 0 [ 464.495002][T21876] workingset_activate 0 [ 464.495002][T21876] workingset_nodereclaim 0 [ 464.495002][T21876] pgrefill 0 00:51:45 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000000b00)={&(0x7f0000000200)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000000a00)=""/225, 0xe1}, 0x40000001) sendmsg$kcm(r1, &(0x7f0000000fc0)={&(0x7f0000000b40)=@nfc={0x27, 0x1, 0x1, 0x4}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000bc0)="8ce63b4bae82af747fb33ab6aa53c9aa04e49442760eaf26781a7fe2a9b152318966501c27e96107da0252a427e7040ff230a8fafb37371b1ec273cab0003d8888c3c87e024282785a3adc66f9fb", 0x4e}, {&(0x7f00000005c0)="44bd0b41b05867dfbf0d790d70f55dc793eb1a69bc9ad1e17b355526de98f14279bb3edec76a6f9e3d40bc8c6271f3b337eda86e", 0x34}, {&(0x7f0000000c40)="276cb12861b8345a2df0f953aaf642af4f245c4c2eb17dcd53ab906c343f24a13240209c3835c719d19fa22672d0ef52e9a317aa5de03b4a5747758f7526bb270268ceaecf71a6d24ecee2c633a63536073f03e2e7cdfd2b92b81284e8c9a32244b42b09bf0f92b3bed766164cef33ae1a59dfb1e05cabab", 0x78}, {&(0x7f0000000d00)="b1c76829170ef23e0437e82197a5f5062d78828bc5dd539d69b957aaec5e6f6b196d68d6aa5489e13d106cad86399e60143915a8d5ca85dc177cd3594f52d26a8a4cf89f1160310b2594c8333d656dcaa81ad163ddbd679e7b2fdd5238c51cbba262c1a0ae9be5ca5f44603930d3b557562a0924d7b32a74a7eb53905d42fc9bec5fbd9bdbf95d71a6467c76aa62dae373206938831936dcd6b0b48b23bc3c546a0ff6278172cf7e5cf4c0e717b191d4718dd8740d466b986b43b656c8614ca0e19db636822162683c585d0e4aa1ae812b11c37c6f8773aa9497162e", 0xdc}, {&(0x7f0000000e00)="dbfe5fdc343424b20debd2ca3f620594572a64af33baf151cf2075874eb2230d9f055d", 0x23}, {&(0x7f0000000e40)="a6328f3378faea5d2f0bfb693956eb10907c9da846222f319ff723e93e0eff37ad176b31e027d2e07aa8c5308b2db7639090d490c0bfe12d3a74550b6803bfadba5ec852252cf9d16ad2b4133c9f2a2978b14e330ff6cf0d40b812f1901fe0550d666299b367f971fb38e66ca29f4a28716464cda2c6d9936bb01c50510215591c7136b65844bb701c5076a95d541a636fe478db63e04e5726982f0a51b85b7afdd475bb9e1a242a61fcf9e0cd81e9dab86078ede401610e8462ba352ac133a2fd40be42618666a5ecbe99ce931b838a2eb2ce9c7b7cfe408bc24bba60d9dd4d0e299a1c64876817e41fcd39", 0xec}], 0x6}, 0x1) r2 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)={r2}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) close(r5) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x200000000001) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x0, 0x2}]}, {0x0, [0x61, 0x2030]}}, &(0x7f0000000340)=""/204, 0x2c, 0xffffffffffffff63, 0x1}, 0x20) sendmsg$kcm(r4, &(0x7f0000003180)={&(0x7f00000004c0)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0x63, 0x5, "d9ae05823d4df315cb9dc2a4c251750b8988bd5215ad7c3746457bb5f9b1533cb70d15604e1a50a6605c529e7bbaa52fa6d7e03f4148b21e96810fcd4792b3", 0x21}, 0x80, 0x0, 0x0, &(0x7f0000002e40)=[{0x108, 0x112, 0xffffffffb4bf3a94, "3546135b07b93257b6b0c798efeb26becc5b20884c84ddfe9b1aa5a02b136d6847e201a4f7dd22bdaa1eb4d5f0bd0fb629f7c030ce096ead741a7c1e7a72eec012a7663836008681526a50035104112a052faedcfd686da18d44d8511c6e47f0d18d05c366f5060602d680e6670a9aa7084771259e522a3b6267060f1d556716497a7bbc3d21d2b751ce74ba108998883468bdd22a6b8b5e696f902c07ab64e899610fdac1e900f94ebdc60a38ff66909c47eccbeb2e0d1cf5a23be1cc8b5344c5b8fdc1cdf52a6596faccf3b0448948122bd48084e5d187f60de0e5cc02c8ebd1d5e0f5b035da3b85cc63f375eb087a6744ab9fec429a35"}], 0x108}, 0x8040) r8 = gettid() perf_event_open(&(0x7f0000001000)={0x4, 0x70, 0x0, 0x9, 0x5, 0x10001, 0x0, 0x3, 0x4000, 0x3, 0x8, 0x9, 0x4, 0x400, 0x6f9, 0x8, 0x6, 0x7, 0xa000000, 0x8, 0x8, 0xc2b, 0xb1, 0x6998, 0x5, 0x0, 0xaf10, 0x1, 0x2, 0x6, 0x4, 0x6, 0x4, 0x6, 0x54e, 0x400, 0x7, 0x40000000000000, 0x0, 0x4, 0x4, @perf_config_ext={0x1000, 0x112c}, 0x0, 0x8000, 0x9, 0x5, 0x1f, 0x5000000000000, 0x3}, r8, 0x3, r7, 0x1) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000300)=r3, 0x4) 00:51:45 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x448, &(0x7f00000015c0)=[{&(0x7f0000000000)="fb00000024000102bfa9d345e7eb8dfe204ee2d70800000000000100f1ffffff801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e7aab6489978112322628c7a1fbab650cdc797d32d3524ea85b198cb44a83c011d2572f9291431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a86105ea0ddbad539ef278168ac8d157a6366ccec93f9fb8f100437172ff070000000021002683d489e1cadfd1a06f9900"/251, 0xfb}], 0x1}, 0x0) 00:51:45 executing program 1: sendmsg(0xffffffffffffffff, 0x0, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) [ 464.495002][T21876] pgscan 0 [ 464.495002][T21876] pgsteal 0 [ 464.495002][T21876] pgactivate 0 [ 464.519450][T21876] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=21875,uid=0 [ 464.540782][T21876] Memory cgroup out of memory: Killed process 21875 (syz-executor.0) total-vm:72576kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 464.694405][ C0] protocol 88fb is buggy, dev hsr_slave_0 00:51:45 executing program 1: sendmsg(0xffffffffffffffff, 0x0, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) 00:51:45 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000000b00)={&(0x7f0000000200)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000000a00)=""/225, 0xe1}, 0x40000001) sendmsg$kcm(r1, &(0x7f0000000fc0)={&(0x7f0000000b40)=@nfc={0x27, 0x1, 0x1, 0x4}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000bc0)="8ce63b4bae82af747fb33ab6aa53c9aa04e49442760eaf26781a7fe2a9b152318966501c27e96107da0252a427e7040ff230a8fafb37371b1ec273cab0003d8888c3c87e024282785a3adc66f9fb", 0x4e}, {&(0x7f00000005c0)="44bd0b41b05867dfbf0d790d70f55dc793eb1a69bc9ad1e17b355526de98f14279bb3edec76a6f9e3d40bc8c6271f3b337eda86e", 0x34}, {&(0x7f0000000c40)="276cb12861b8345a2df0f953aaf642af4f245c4c2eb17dcd53ab906c343f24a13240209c3835c719d19fa22672d0ef52e9a317aa5de03b4a5747758f7526bb270268ceaecf71a6d24ecee2c633a63536073f03e2e7cdfd2b92b81284e8c9a32244b42b09bf0f92b3bed766164cef33ae1a59dfb1e05cabab", 0x78}, {&(0x7f0000000d00)="b1c76829170ef23e0437e82197a5f5062d78828bc5dd539d69b957aaec5e6f6b196d68d6aa5489e13d106cad86399e60143915a8d5ca85dc177cd3594f52d26a8a4cf89f1160310b2594c8333d656dcaa81ad163ddbd679e7b2fdd5238c51cbba262c1a0ae9be5ca5f44603930d3b557562a0924d7b32a74a7eb53905d42fc9bec5fbd9bdbf95d71a6467c76aa62dae373206938831936dcd6b0b48b23bc3c546a0ff6278172cf7e5cf4c0e717b191d4718dd8740d466b986b43b656c8614ca0e19db636822162683c585d0e4aa1ae812b11c37c6f8773aa9497162e", 0xdc}, {&(0x7f0000000e00)="dbfe5fdc343424b20debd2ca3f620594572a64af33baf151cf2075874eb2230d9f055d", 0x23}, {&(0x7f0000000e40)="a6328f3378faea5d2f0bfb693956eb10907c9da846222f319ff723e93e0eff37ad176b31e027d2e07aa8c5308b2db7639090d490c0bfe12d3a74550b6803bfadba5ec852252cf9d16ad2b4133c9f2a2978b14e330ff6cf0d40b812f1901fe0550d666299b367f971fb38e66ca29f4a28716464cda2c6d9936bb01c50510215591c7136b65844bb701c5076a95d541a636fe478db63e04e5726982f0a51b85b7afdd475bb9e1a242a61fcf9e0cd81e9dab86078ede401610e8462ba352ac133a2fd40be42618666a5ecbe99ce931b838a2eb2ce9c7b7cfe408bc24bba60d9dd4d0e299a1c64876817e41fcd39", 0xec}], 0x6}, 0x1) r2 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)={r2}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) close(r5) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x200000000001) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x0, 0x2}]}, {0x0, [0x61, 0x2030]}}, &(0x7f0000000340)=""/204, 0x2c, 0xffffffffffffff63, 0x1}, 0x20) sendmsg$kcm(r4, &(0x7f0000003180)={&(0x7f00000004c0)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0x63, 0x5, "d9ae05823d4df315cb9dc2a4c251750b8988bd5215ad7c3746457bb5f9b1533cb70d15604e1a50a6605c529e7bbaa52fa6d7e03f4148b21e96810fcd4792b3", 0x21}, 0x80, 0x0, 0x0, &(0x7f0000002e40)=[{0x108, 0x112, 0xffffffffb4bf3a94, "3546135b07b93257b6b0c798efeb26becc5b20884c84ddfe9b1aa5a02b136d6847e201a4f7dd22bdaa1eb4d5f0bd0fb629f7c030ce096ead741a7c1e7a72eec012a7663836008681526a50035104112a052faedcfd686da18d44d8511c6e47f0d18d05c366f5060602d680e6670a9aa7084771259e522a3b6267060f1d556716497a7bbc3d21d2b751ce74ba108998883468bdd22a6b8b5e696f902c07ab64e899610fdac1e900f94ebdc60a38ff66909c47eccbeb2e0d1cf5a23be1cc8b5344c5b8fdc1cdf52a6596faccf3b0448948122bd48084e5d187f60de0e5cc02c8ebd1d5e0f5b035da3b85cc63f375eb087a6744ab9fec429a35"}], 0x108}, 0x8040) r8 = gettid() perf_event_open(&(0x7f0000001000)={0x4, 0x70, 0x0, 0x9, 0x5, 0x10001, 0x0, 0x3, 0x4000, 0x3, 0x8, 0x9, 0x4, 0x400, 0x6f9, 0x8, 0x6, 0x7, 0xa000000, 0x8, 0x8, 0xc2b, 0xb1, 0x6998, 0x5, 0x0, 0xaf10, 0x1, 0x2, 0x6, 0x4, 0x6, 0x4, 0x6, 0x54e, 0x400, 0x7, 0x40000000000000, 0x0, 0x4, 0x4, @perf_config_ext={0x1000, 0x112c}, 0x0, 0x8000, 0x9, 0x5, 0x1f, 0x5000000000000, 0x3}, r8, 0x3, r7, 0x1) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000300)=r3, 0x4) [ 464.823775][T21899] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 464.852363][ T1058] oom_reaper: reaped process 21875 (syz-executor.0), now anon-rss:0kB, file-rss:34860kB, shmem-rss:0kB 00:51:46 executing program 3: sendmsg(0xffffffffffffffff, 0x0, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) 00:51:46 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000000b00)={&(0x7f0000000200)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000000a00)=""/225, 0xe1}, 0x40000001) sendmsg$kcm(r1, &(0x7f0000000fc0)={&(0x7f0000000b40)=@nfc={0x27, 0x1, 0x1, 0x4}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000bc0)="8ce63b4bae82af747fb33ab6aa53c9aa04e49442760eaf26781a7fe2a9b152318966501c27e96107da0252a427e7040ff230a8fafb37371b1ec273cab0003d8888c3c87e024282785a3adc66f9fb", 0x4e}, {&(0x7f00000005c0)="44bd0b41b05867dfbf0d790d70f55dc793eb1a69bc9ad1e17b355526de98f14279bb3edec76a6f9e3d40bc8c6271f3b337eda86e", 0x34}, {&(0x7f0000000c40)="276cb12861b8345a2df0f953aaf642af4f245c4c2eb17dcd53ab906c343f24a13240209c3835c719d19fa22672d0ef52e9a317aa5de03b4a5747758f7526bb270268ceaecf71a6d24ecee2c633a63536073f03e2e7cdfd2b92b81284e8c9a32244b42b09bf0f92b3bed766164cef33ae1a59dfb1e05cabab", 0x78}, {&(0x7f0000000d00)="b1c76829170ef23e0437e82197a5f5062d78828bc5dd539d69b957aaec5e6f6b196d68d6aa5489e13d106cad86399e60143915a8d5ca85dc177cd3594f52d26a8a4cf89f1160310b2594c8333d656dcaa81ad163ddbd679e7b2fdd5238c51cbba262c1a0ae9be5ca5f44603930d3b557562a0924d7b32a74a7eb53905d42fc9bec5fbd9bdbf95d71a6467c76aa62dae373206938831936dcd6b0b48b23bc3c546a0ff6278172cf7e5cf4c0e717b191d4718dd8740d466b986b43b656c8614ca0e19db636822162683c585d0e4aa1ae812b11c37c6f8773aa9497162e", 0xdc}, {&(0x7f0000000e00)="dbfe5fdc343424b20debd2ca3f620594572a64af33baf151cf2075874eb2230d9f055d", 0x23}, {&(0x7f0000000e40)="a6328f3378faea5d2f0bfb693956eb10907c9da846222f319ff723e93e0eff37ad176b31e027d2e07aa8c5308b2db7639090d490c0bfe12d3a74550b6803bfadba5ec852252cf9d16ad2b4133c9f2a2978b14e330ff6cf0d40b812f1901fe0550d666299b367f971fb38e66ca29f4a28716464cda2c6d9936bb01c50510215591c7136b65844bb701c5076a95d541a636fe478db63e04e5726982f0a51b85b7afdd475bb9e1a242a61fcf9e0cd81e9dab86078ede401610e8462ba352ac133a2fd40be42618666a5ecbe99ce931b838a2eb2ce9c7b7cfe408bc24bba60d9dd4d0e299a1c64876817e41fcd39", 0xec}], 0x6}, 0x1) r2 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)={r2}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) close(r5) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x200000000001) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x0, 0x2}]}, {0x0, [0x61, 0x2030]}}, &(0x7f0000000340)=""/204, 0x2c, 0xffffffffffffff63, 0x1}, 0x20) sendmsg$kcm(r4, &(0x7f0000003180)={&(0x7f00000004c0)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0x63, 0x5, "d9ae05823d4df315cb9dc2a4c251750b8988bd5215ad7c3746457bb5f9b1533cb70d15604e1a50a6605c529e7bbaa52fa6d7e03f4148b21e96810fcd4792b3", 0x21}, 0x80, 0x0, 0x0, &(0x7f0000002e40)=[{0x108, 0x112, 0xffffffffb4bf3a94, "3546135b07b93257b6b0c798efeb26becc5b20884c84ddfe9b1aa5a02b136d6847e201a4f7dd22bdaa1eb4d5f0bd0fb629f7c030ce096ead741a7c1e7a72eec012a7663836008681526a50035104112a052faedcfd686da18d44d8511c6e47f0d18d05c366f5060602d680e6670a9aa7084771259e522a3b6267060f1d556716497a7bbc3d21d2b751ce74ba108998883468bdd22a6b8b5e696f902c07ab64e899610fdac1e900f94ebdc60a38ff66909c47eccbeb2e0d1cf5a23be1cc8b5344c5b8fdc1cdf52a6596faccf3b0448948122bd48084e5d187f60de0e5cc02c8ebd1d5e0f5b035da3b85cc63f375eb087a6744ab9fec429a35"}], 0x108}, 0x8040) r8 = gettid() perf_event_open(&(0x7f0000001000)={0x4, 0x70, 0x0, 0x9, 0x5, 0x10001, 0x0, 0x3, 0x4000, 0x3, 0x8, 0x9, 0x4, 0x400, 0x6f9, 0x8, 0x6, 0x7, 0xa000000, 0x8, 0x8, 0xc2b, 0xb1, 0x6998, 0x5, 0x0, 0xaf10, 0x1, 0x2, 0x6, 0x4, 0x6, 0x4, 0x6, 0x54e, 0x400, 0x7, 0x40000000000000, 0x0, 0x4, 0x4, @perf_config_ext={0x1000, 0x112c}, 0x0, 0x8000, 0x9, 0x5, 0x1f, 0x5000000000000, 0x3}, r8, 0x3, r7, 0x1) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000300)=r3, 0x4) 00:51:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x0, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={0x0, 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) 00:51:46 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x0, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={0x0, 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 465.170924][T21138] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 465.206203][T21138] CPU: 0 PID: 21138 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #0 [ 465.214134][T21138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.224184][T21138] Call Trace: [ 465.224211][T21138] dump_stack+0x172/0x1f0 [ 465.224233][T21138] dump_header+0x10b/0x82d [ 465.224246][T21138] ? oom_kill_process+0x94/0x3f0 [ 465.224269][T21138] oom_kill_process.cold+0x10/0x15 [ 465.246314][T21138] out_of_memory+0x79a/0x12c0 [ 465.246330][T21138] ? lock_downgrade+0x920/0x920 [ 465.246345][T21138] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 465.246361][T21138] ? oom_killer_disable+0x280/0x280 [ 465.246388][T21138] mem_cgroup_out_of_memory+0x1d8/0x240 [ 465.246404][T21138] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 465.246425][T21138] ? do_raw_spin_unlock+0x57/0x270 [ 465.246444][T21138] ? _raw_spin_unlock+0x2d/0x50 [ 465.246462][T21138] try_charge+0xf4b/0x1440 [ 465.246484][T21138] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 465.246497][T21138] ? percpu_ref_tryget_live+0x111/0x290 [ 465.246515][T21138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 465.246533][T21138] ? __kasan_check_read+0x11/0x20 [ 465.246554][T21138] ? get_mem_cgroup_from_mm+0x156/0x320 00:51:46 executing program 3: sendmsg(0xffffffffffffffff, 0x0, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) [ 465.246572][T21138] mem_cgroup_try_charge+0x136/0x590 [ 465.246598][T21138] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 465.246618][T21138] __handle_mm_fault+0x1e3a/0x3f20 [ 465.246644][T21138] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 465.261953][T21138] ? __kasan_check_read+0x11/0x20 [ 465.292712][T21138] handle_mm_fault+0x1b5/0x6b0 [ 465.292738][T21138] __do_page_fault+0x536/0xdd0 [ 465.292765][T21138] do_page_fault+0x38/0x590 [ 465.292785][T21138] page_fault+0x39/0x40 [ 465.292806][T21138] RIP: 0033:0x4034f2 [ 465.302575][T21916] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 465.303874][T21138] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 a9 8d 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 c9 42 05 00 48 [ 465.303883][T21138] RSP: 002b:00007ffd83043760 EFLAGS: 00010246 00:51:46 executing program 3: sendmsg(0xffffffffffffffff, 0x0, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) [ 465.303895][T21138] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000458c35 [ 465.303904][T21138] RDX: 00007ffd83044860 RSI: 0000000000000002 RDI: 00007ffd830448f0 [ 465.303912][T21138] RBP: 0000000000000049 R08: 0000000000000000 R09: 000000000000000a [ 465.303921][T21138] R10: 0000000000000005 R11: 0000000000000246 R12: 00007ffd830448f0 [ 465.303929][T21138] R13: 00005555572d6940 R14: 0000000000000000 R15: 00007ffd83045980 00:51:46 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x0, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={0x0, 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 465.512611][T21138] memory: usage 3932kB, limit 0kB, failcnt 28 [ 465.533197][T21138] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 465.604896][T21138] Memory cgroup stats for /syz0: [ 465.604986][T21138] anon 0 [ 465.604986][T21138] file 540672 [ 465.604986][T21138] kernel_stack 0 [ 465.604986][T21138] slab 3796992 [ 465.604986][T21138] sock 0 [ 465.604986][T21138] shmem 348160 [ 465.604986][T21138] file_mapped 0 [ 465.604986][T21138] file_dirty 0 [ 465.604986][T21138] file_writeback 0 [ 465.604986][T21138] anon_thp 0 [ 465.604986][T21138] inactive_anon 540672 [ 465.604986][T21138] active_anon 0 [ 465.604986][T21138] inactive_file 135168 [ 465.604986][T21138] active_file 0 [ 465.604986][T21138] unevictable 0 [ 465.604986][T21138] slab_reclaimable 1757184 [ 465.604986][T21138] slab_unreclaimable 2039808 [ 465.604986][T21138] pgfault 40326 [ 465.604986][T21138] pgmajfault 0 [ 465.604986][T21138] workingset_refault 0 [ 465.604986][T21138] workingset_activate 0 [ 465.604986][T21138] workingset_nodereclaim 0 [ 465.604986][T21138] pgrefill 0 [ 465.604986][T21138] pgscan 0 [ 465.604986][T21138] pgsteal 0 [ 465.604986][T21138] pgactivate 0 [ 465.723749][T21138] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=21138,uid=0 [ 465.739289][T21928] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 465.759787][T21138] Memory cgroup out of memory: Killed process 21138 (syz-executor.0) total-vm:72444kB, anon-rss:92kB, file-rss:35776kB, shmem-rss:0kB [ 465.844881][T21916] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 465.879901][T21916] CPU: 0 PID: 21916 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #0 00:51:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000000), 0x70db2da734432a8e) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, &(0x7f0000000080), 0xfcf3) [ 465.887829][T21916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.897905][T21916] Call Trace: [ 465.897929][T21916] dump_stack+0x172/0x1f0 [ 465.897948][T21916] dump_header+0x10b/0x82d [ 465.897966][T21916] oom_kill_process.cold+0x10/0x15 [ 465.897981][T21916] out_of_memory+0x79a/0x12c0 [ 465.898003][T21916] ? oom_killer_disable+0x280/0x280 [ 465.898028][T21916] mem_cgroup_out_of_memory+0x1d8/0x240 [ 465.898043][T21916] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 465.898070][T21916] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 465.942349][T21916] ? cgroup_file_notify+0x140/0x1b0 [ 465.947574][T21916] memory_max_write+0x262/0x3a0 [ 465.952444][T21916] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 465.959209][T21916] ? lock_acquire+0x20b/0x410 [ 465.959235][T21916] cgroup_file_write+0x241/0x790 [ 465.959257][T21916] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 465.959270][T21916] ? cgroup_migrate_add_task+0x890/0x890 [ 465.959291][T21916] ? cgroup_migrate_add_task+0x890/0x890 [ 465.959307][T21916] kernfs_fop_write+0x2b8/0x480 [ 465.959328][T21916] __vfs_write+0x8a/0x110 [ 465.959341][T21916] ? kernfs_fop_open+0xd80/0xd80 [ 465.959358][T21916] vfs_write+0x268/0x5d0 [ 465.959379][T21916] ksys_write+0x14f/0x290 [ 465.959397][T21916] ? __ia32_sys_read+0xb0/0xb0 [ 465.959414][T21916] ? do_syscall_64+0x26/0x6a0 [ 465.959431][T21916] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.959445][T21916] ? do_syscall_64+0x26/0x6a0 [ 465.959464][T21916] __x64_sys_write+0x73/0xb0 [ 465.959479][T21916] do_syscall_64+0xfd/0x6a0 [ 465.959499][T21916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.959511][T21916] RIP: 0033:0x459879 [ 465.959526][T21916] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 465.959534][T21916] RSP: 002b:00007f73944d0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 465.959547][T21916] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459879 00:51:47 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000000b00)={&(0x7f0000000200)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000000a00)=""/225, 0xe1}, 0x40000001) sendmsg$kcm(r1, &(0x7f0000000fc0)={&(0x7f0000000b40)=@nfc={0x27, 0x1, 0x1, 0x4}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000bc0)="8ce63b4bae82af747fb33ab6aa53c9aa04e49442760eaf26781a7fe2a9b152318966501c27e96107da0252a427e7040ff230a8fafb37371b1ec273cab0003d8888c3c87e024282785a3adc66f9fb", 0x4e}, {&(0x7f00000005c0)="44bd0b41b05867dfbf0d790d70f55dc793eb1a69bc9ad1e17b355526de98f14279bb3edec76a6f9e3d40bc8c6271f3b337eda86e", 0x34}, {&(0x7f0000000c40)="276cb12861b8345a2df0f953aaf642af4f245c4c2eb17dcd53ab906c343f24a13240209c3835c719d19fa22672d0ef52e9a317aa5de03b4a5747758f7526bb270268ceaecf71a6d24ecee2c633a63536073f03e2e7cdfd2b92b81284e8c9a32244b42b09bf0f92b3bed766164cef33ae1a59dfb1e05cabab", 0x78}, {&(0x7f0000000d00)="b1c76829170ef23e0437e82197a5f5062d78828bc5dd539d69b957aaec5e6f6b196d68d6aa5489e13d106cad86399e60143915a8d5ca85dc177cd3594f52d26a8a4cf89f1160310b2594c8333d656dcaa81ad163ddbd679e7b2fdd5238c51cbba262c1a0ae9be5ca5f44603930d3b557562a0924d7b32a74a7eb53905d42fc9bec5fbd9bdbf95d71a6467c76aa62dae373206938831936dcd6b0b48b23bc3c546a0ff6278172cf7e5cf4c0e717b191d4718dd8740d466b986b43b656c8614ca0e19db636822162683c585d0e4aa1ae812b11c37c6f8773aa9497162e", 0xdc}, {&(0x7f0000000e00)="dbfe5fdc343424b20debd2ca3f620594572a64af33baf151cf2075874eb2230d9f055d", 0x23}, {&(0x7f0000000e40)="a6328f3378faea5d2f0bfb693956eb10907c9da846222f319ff723e93e0eff37ad176b31e027d2e07aa8c5308b2db7639090d490c0bfe12d3a74550b6803bfadba5ec852252cf9d16ad2b4133c9f2a2978b14e330ff6cf0d40b812f1901fe0550d666299b367f971fb38e66ca29f4a28716464cda2c6d9936bb01c50510215591c7136b65844bb701c5076a95d541a636fe478db63e04e5726982f0a51b85b7afdd475bb9e1a242a61fcf9e0cd81e9dab86078ede401610e8462ba352ac133a2fd40be42618666a5ecbe99ce931b838a2eb2ce9c7b7cfe408bc24bba60d9dd4d0e299a1c64876817e41fcd39", 0xec}], 0x6}, 0x1) r2 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)={r2}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) close(r5) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x200000000001) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x0, 0x2}]}, {0x0, [0x61, 0x2030]}}, &(0x7f0000000340)=""/204, 0x2c, 0xffffffffffffff63, 0x1}, 0x20) sendmsg$kcm(r4, &(0x7f0000003180)={&(0x7f00000004c0)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0x63, 0x5, "d9ae05823d4df315cb9dc2a4c251750b8988bd5215ad7c3746457bb5f9b1533cb70d15604e1a50a6605c529e7bbaa52fa6d7e03f4148b21e96810fcd4792b3", 0x21}, 0x80, 0x0, 0x0, &(0x7f0000002e40)=[{0x108, 0x112, 0xffffffffb4bf3a94, "3546135b07b93257b6b0c798efeb26becc5b20884c84ddfe9b1aa5a02b136d6847e201a4f7dd22bdaa1eb4d5f0bd0fb629f7c030ce096ead741a7c1e7a72eec012a7663836008681526a50035104112a052faedcfd686da18d44d8511c6e47f0d18d05c366f5060602d680e6670a9aa7084771259e522a3b6267060f1d556716497a7bbc3d21d2b751ce74ba108998883468bdd22a6b8b5e696f902c07ab64e899610fdac1e900f94ebdc60a38ff66909c47eccbeb2e0d1cf5a23be1cc8b5344c5b8fdc1cdf52a6596faccf3b0448948122bd48084e5d187f60de0e5cc02c8ebd1d5e0f5b035da3b85cc63f375eb087a6744ab9fec429a35"}], 0x108}, 0x8040) r8 = gettid() perf_event_open(&(0x7f0000001000)={0x4, 0x70, 0x0, 0x9, 0x5, 0x10001, 0x0, 0x3, 0x4000, 0x3, 0x8, 0x9, 0x4, 0x400, 0x6f9, 0x8, 0x6, 0x7, 0xa000000, 0x8, 0x8, 0xc2b, 0xb1, 0x6998, 0x5, 0x0, 0xaf10, 0x1, 0x2, 0x6, 0x4, 0x6, 0x4, 0x6, 0x54e, 0x400, 0x7, 0x40000000000000, 0x0, 0x4, 0x4, @perf_config_ext={0x1000, 0x112c}, 0x0, 0x8000, 0x9, 0x5, 0x1f, 0x5000000000000, 0x3}, r8, 0x3, r7, 0x1) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000300)=r3, 0x4) [ 465.959555][T21916] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 465.959563][T21916] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 465.959570][T21916] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73944d16d4 [ 465.959579][T21916] R13: 00000000004c9a03 R14: 00000000004e10c8 R15: 00000000ffffffff [ 465.964070][T21916] memory: usage 16304kB, limit 0kB, failcnt 20 [ 465.977091][T21916] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 465.990223][T21916] Memory cgroup stats for /syz1: [ 465.991002][T21916] anon 2277376 [ 465.991002][T21916] file 126976 [ 465.991002][T21916] kernel_stack 65536 [ 465.991002][T21916] slab 14041088 [ 465.991002][T21916] sock 0 [ 465.991002][T21916] shmem 36864 [ 465.991002][T21916] file_mapped 0 [ 465.991002][T21916] file_dirty 0 [ 465.991002][T21916] file_writeback 0 [ 465.991002][T21916] anon_thp 2097152 [ 465.991002][T21916] inactive_anon 0 [ 465.991002][T21916] active_anon 2207744 [ 465.991002][T21916] inactive_file 0 [ 465.991002][T21916] active_file 0 [ 465.991002][T21916] unevictable 0 [ 465.991002][T21916] slab_reclaimable 1622016 [ 465.991002][T21916] slab_unreclaimable 12419072 [ 465.991002][T21916] pgfault 40755 [ 465.991002][T21916] pgmajfault 0 [ 465.991002][T21916] workingset_refault 0 [ 465.991002][T21916] workingset_activate 0 [ 465.991002][T21916] workingset_nodereclaim 0 [ 465.991002][T21916] pgrefill 34 [ 465.991002][T21916] pgscan 0 [ 465.991002][T21916] pgsteal 0 [ 465.991002][T21916] pgactivate 0 [ 466.007581][T21916] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=21915,uid=0 [ 466.016642][T21916] Memory cgroup out of memory: Killed process 21915 (syz-executor.1) total-vm:72708kB, anon-rss:2196kB, file-rss:35836kB, shmem-rss:0kB [ 466.034363][ T1058] oom_reaper: reaped process 21915 (syz-executor.1), now anon-rss:0kB, file-rss:34916kB, shmem-rss:0kB [ 466.046724][T21929] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 466.289014][T21929] CPU: 1 PID: 21929 Comm: syz-executor.3 Not tainted 5.3.0-rc3+ #0 [ 466.296935][T21929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.296955][T21929] Call Trace: [ 466.296977][T21929] dump_stack+0x172/0x1f0 [ 466.296997][T21929] dump_header+0x10b/0x82d [ 466.297015][T21929] oom_kill_process.cold+0x10/0x15 [ 466.297086][T21929] out_of_memory+0x79a/0x12c0 [ 466.297109][T21929] ? oom_killer_disable+0x280/0x280 [ 466.314765][T21929] mem_cgroup_out_of_memory+0x1d8/0x240 [ 466.314783][T21929] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 466.314812][T21929] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 466.314828][T21929] ? cgroup_file_notify+0x140/0x1b0 [ 466.314847][T21929] memory_max_write+0x262/0x3a0 [ 466.324363][T21929] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 466.324382][T21929] ? lock_acquire+0x190/0x410 [ 466.324395][T21929] ? kernfs_fop_write+0x227/0x480 [ 466.324418][T21929] cgroup_file_write+0x241/0x790 [ 466.324435][T21929] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 466.324452][T21929] ? cgroup_migrate_add_task+0x890/0x890 [ 466.334303][T21929] ? cgroup_migrate_add_task+0x890/0x890 [ 466.334318][T21929] kernfs_fop_write+0x2b8/0x480 [ 466.334340][T21929] __vfs_write+0x8a/0x110 [ 466.334356][T21929] ? kernfs_fop_open+0xd80/0xd80 [ 466.345501][T21929] vfs_write+0x268/0x5d0 [ 466.345524][T21929] ksys_write+0x14f/0x290 [ 466.345540][T21929] ? __ia32_sys_read+0xb0/0xb0 [ 466.345559][T21929] ? do_syscall_64+0x26/0x6a0 [ 466.345575][T21929] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 466.345592][T21929] ? do_syscall_64+0x26/0x6a0 [ 466.356566][T21929] __x64_sys_write+0x73/0xb0 [ 466.356591][T21929] do_syscall_64+0xfd/0x6a0 [ 466.356613][T21929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 466.356624][T21929] RIP: 0033:0x459879 [ 466.356642][T21929] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 466.368201][T21929] RSP: 002b:00007f15943f6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 00:51:47 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x0, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={0x0, 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 466.368215][T21929] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459879 [ 466.368224][T21929] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 466.368232][T21929] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 466.368241][T21929] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f15943f76d4 [ 466.368249][T21929] R13: 00000000004c9a03 R14: 00000000004e10c8 R15: 00000000ffffffff [ 466.568703][T21929] memory: usage 5668kB, limit 0kB, failcnt 60 [ 466.602629][T21929] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 00:51:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="230000004e00817491bc655067d7aee4050c00000f000100f0a30000000000008b1832", 0x23}], 0x1}, 0x0) [ 466.626083][T21929] Memory cgroup stats for /syz3: [ 466.626233][T21929] anon 2265088 [ 466.626233][T21929] file 208896 [ 466.626233][T21929] kernel_stack 65536 [ 466.626233][T21929] slab 3399680 [ 466.626233][T21929] sock 0 [ 466.626233][T21929] shmem 0 [ 466.626233][T21929] file_mapped 0 [ 466.626233][T21929] file_dirty 135168 [ 466.626233][T21929] file_writeback 0 [ 466.626233][T21929] anon_thp 2097152 [ 466.626233][T21929] inactive_anon 0 [ 466.626233][T21929] active_anon 2195456 [ 466.626233][T21929] inactive_file 135168 [ 466.626233][T21929] active_file 0 [ 466.626233][T21929] unevictable 0 [ 466.626233][T21929] slab_reclaimable 1351680 [ 466.626233][T21929] slab_unreclaimable 2048000 [ 466.626233][T21929] pgfault 38346 [ 466.626233][T21929] pgmajfault 0 [ 466.626233][T21929] workingset_refault 0 [ 466.626233][T21929] workingset_activate 0 [ 466.626233][T21929] workingset_nodereclaim 0 [ 466.626233][T21929] pgrefill 0 [ 466.626233][T21929] pgscan 0 [ 466.626233][T21929] pgsteal 0 [ 466.626233][T21929] pgactivate 0 [ 466.729470][T21929] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=21926,uid=0 [ 466.761410][T21929] Memory cgroup out of memory: Killed process 21929 (syz-executor.3) total-vm:72708kB, anon-rss:2196kB, file-rss:35892kB, shmem-rss:0kB [ 466.783884][ T1058] oom_reaper: reaped process 21929 (syz-executor.3), now anon-rss:0kB, file-rss:34932kB, shmem-rss:0kB [ 466.802407][T21142] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 466.812870][T21142] CPU: 1 PID: 21142 Comm: syz-executor.1 Not tainted 5.3.0-rc3+ #0 [ 466.820774][T21142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.830834][T21142] Call Trace: [ 466.834133][T21142] dump_stack+0x172/0x1f0 [ 466.838471][T21142] dump_header+0x10b/0x82d [ 466.842886][T21142] ? oom_kill_process+0x94/0x3f0 [ 466.847826][T21142] oom_kill_process.cold+0x10/0x15 [ 466.852942][T21142] out_of_memory+0x79a/0x12c0 [ 466.857625][T21142] ? lock_downgrade+0x920/0x920 [ 466.862488][T21142] ? oom_killer_disable+0x280/0x280 [ 466.867698][T21142] mem_cgroup_out_of_memory+0x1d8/0x240 [ 466.873249][T21142] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 466.878894][T21142] ? do_raw_spin_unlock+0x57/0x270 [ 466.884012][T21142] ? _raw_spin_unlock+0x2d/0x50 [ 466.888862][T21142] try_charge+0xf4b/0x1440 [ 466.893290][T21142] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 466.898836][T21142] ? percpu_ref_tryget_live+0x111/0x290 [ 466.904404][T21142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 466.910642][T21142] ? __kasan_check_read+0x11/0x20 [ 466.915682][T21142] ? get_mem_cgroup_from_mm+0x156/0x320 [ 466.921232][T21142] mem_cgroup_try_charge+0x136/0x590 [ 466.926536][T21142] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 466.932178][T21142] __handle_mm_fault+0x1e3a/0x3f20 [ 466.937304][T21142] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 466.942875][T21142] ? __kasan_check_read+0x11/0x20 [ 466.947909][T21142] handle_mm_fault+0x1b5/0x6b0 [ 466.952687][T21142] __do_page_fault+0x536/0xdd0 [ 466.957457][T21142] do_page_fault+0x38/0x590 [ 466.961975][T21142] page_fault+0x39/0x40 [ 466.966125][T21142] RIP: 0033:0x43095a [ 466.970015][T21142] Code: 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 0c 46 64 00 85 c0 0f 84 3a f7 ff ff [ 466.989646][T21142] RSP: 002b:00007ffd5b60c250 EFLAGS: 00010206 [ 466.995939][T21142] RAX: 0000000000010651 RBX: 0000000000715640 RCX: 0000000000008041 [ 467.003898][T21142] RDX: 000055555612b970 RSI: 00005555561339b0 RDI: 0000000000000003 [ 467.011890][T21142] RBP: 0000000000008041 R08: 0000000000000000 R09: 000000000000000a [ 467.019855][T21142] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000715698 00:51:48 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x0, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={0x0, 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 467.027920][T21142] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 467.044530][T21142] memory: usage 13912kB, limit 0kB, failcnt 28 [ 467.050805][T21142] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 467.057827][T21142] Memory cgroup stats for /syz1: [ 467.057955][T21142] anon 12288 [ 467.057955][T21142] file 126976 [ 467.057955][T21142] kernel_stack 0 [ 467.057955][T21142] slab 14041088 [ 467.057955][T21142] sock 0 [ 467.057955][T21142] shmem 36864 [ 467.057955][T21142] file_mapped 0 [ 467.057955][T21142] file_dirty 0 [ 467.057955][T21142] file_writeback 0 [ 467.057955][T21142] anon_thp 0 [ 467.057955][T21142] inactive_anon 0 [ 467.057955][T21142] active_anon 12288 [ 467.057955][T21142] inactive_file 0 [ 467.057955][T21142] active_file 0 [ 467.057955][T21142] unevictable 0 [ 467.057955][T21142] slab_reclaimable 1622016 [ 467.057955][T21142] slab_unreclaimable 12419072 [ 467.057955][T21142] pgfault 40788 [ 467.057955][T21142] pgmajfault 0 [ 467.057955][T21142] workingset_refault 0 [ 467.057955][T21142] workingset_activate 0 [ 467.057955][T21142] workingset_nodereclaim 0 [ 467.057955][T21142] pgrefill 34 [ 467.057955][T21142] pgscan 0 [ 467.057955][T21142] pgsteal 0 [ 467.057955][T21142] pgactivate 0 [ 467.062904][T21142] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=21142,uid=0 [ 467.168816][T21142] Memory cgroup out of memory: Killed process 21142 (syz-executor.1) total-vm:72444kB, anon-rss:96kB, file-rss:35776kB, shmem-rss:0kB 00:51:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x0, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={0x0, 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 467.183856][ T1058] oom_reaper: reaped process 21142 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 00:51:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000000), 0x70db2da734432a8e) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, &(0x7f0000000080), 0xfcf3) 00:51:48 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="230000004e00817491bc655067d7aee4050c00000f000100f0a30000000000008b1832", 0x23}], 0x1}, 0x0) 00:51:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000000), 0x70db2da734432a8e) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, &(0x7f0000000080), 0xfcf3) 00:51:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x0, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={0x0, 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) 00:51:49 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x0, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={0x0, 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) 00:51:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="230000004e00817491bc655067d7aee4050c00000f000100f0a30000000000008b1832", 0x23}], 0x1}, 0x0) 00:51:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000000), 0x70db2da734432a8e) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, &(0x7f0000000080), 0xfcf3) 00:51:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000000), 0x70db2da734432a8e) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, &(0x7f0000000080), 0xfcf3) 00:51:49 executing program 1: r0 = socket$kcm(0xa, 0x1000000000000001, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() r5 = perf_event_open(0x0, r4, 0x7, r3, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r7 = socket$kcm(0x29, 0x2, 0x0) r8 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r8, 0x29, 0x14, &(0x7f0000000040), 0x52d) close(r8) r9 = gettid() r10 = perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x0, 0x2, 0x0, 0x5cdc, 0x0, 0x1, 0xc1200, 0x4, 0x9, 0xc6, 0x6, 0x0, 0x1, 0x200, 0xe71, 0x5, 0x7, 0x0, 0x80, 0x5, 0x0, 0x2, 0x1, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x8, 0x1, 0x0, 0x8001, 0x0, @perf_bp={0x0, 0x9}, 0x6404, 0xe30, 0xcae1, 0x4}, r9, 0x0, 0xffffffffffffffff, 0x3) close(r5) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000000100)=0xf20) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000200)) close(r2) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20008844) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000140)={r0}) 00:51:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000000), 0x70db2da734432a8e) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, &(0x7f0000000080), 0xfcf3) [ 468.972171][T21970] IPVS: ftp: loaded support on port[0] = 21 [ 469.508317][T21970] chnl_net:caif_netlink_parms(): no params data found [ 469.745723][T21970] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.752887][T21970] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.769183][T21970] device bridge_slave_0 entered promiscuous mode [ 469.984258][T21970] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.991526][T21970] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.021692][T21970] device bridge_slave_1 entered promiscuous mode [ 470.041288][T21974] IPVS: ftp: loaded support on port[0] = 21 [ 470.232203][T21970] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 470.252527][T21970] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 470.281977][ T7] device bridge_slave_1 left promiscuous mode [ 470.295783][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.335434][ T7] device bridge_slave_0 left promiscuous mode [ 470.341673][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 474.364865][ T7] device hsr_slave_0 left promiscuous mode [ 474.414513][ T7] device hsr_slave_1 left promiscuous mode [ 474.471038][ T7] team0 (unregistering): Port device team_slave_1 removed [ 474.496386][ T7] team0 (unregistering): Port device team_slave_0 removed [ 474.519295][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 474.576408][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 474.711057][ T7] bond0 (unregistering): Released all slaves [ 474.888736][T21970] team0: Port device team_slave_0 added [ 474.913171][T21970] team0: Port device team_slave_1 added [ 475.107357][T21970] device hsr_slave_0 entered promiscuous mode [ 475.144900][T21970] device hsr_slave_1 entered promiscuous mode [ 475.256041][T21974] chnl_net:caif_netlink_parms(): no params data found [ 475.331298][T21974] bridge0: port 1(bridge_slave_0) entered blocking state [ 475.354400][T21974] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.362602][T21974] device bridge_slave_0 entered promiscuous mode [ 475.386887][T21974] bridge0: port 2(bridge_slave_1) entered blocking state [ 475.394024][T21974] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.415450][T21974] device bridge_slave_1 entered promiscuous mode [ 475.461306][T21974] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 475.486788][T21974] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 475.549166][T21970] 8021q: adding VLAN 0 to HW filter on device bond0 [ 475.566028][T21974] team0: Port device team_slave_0 added [ 475.573421][T21974] team0: Port device team_slave_1 added [ 475.604164][T21970] 8021q: adding VLAN 0 to HW filter on device team0 [ 475.624974][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 475.632859][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 475.677463][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 475.695927][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 475.714656][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 475.721747][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 475.787441][T21974] device hsr_slave_0 entered promiscuous mode [ 475.824758][T21974] device hsr_slave_1 entered promiscuous mode [ 475.865282][T21974] debugfs: Directory 'hsr0' with parent '/' already present! [ 475.896535][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 475.905448][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 475.914139][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 475.944858][T12197] bridge0: port 2(bridge_slave_1) entered blocking state [ 475.951956][T12197] bridge0: port 2(bridge_slave_1) entered forwarding state [ 475.974737][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 475.983620][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 476.015300][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 476.034467][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 476.043340][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 476.065185][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 476.100234][T21970] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 476.120886][T21970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 476.146113][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 476.164899][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 476.173524][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 476.237077][T21970] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 476.294479][T21974] 8021q: adding VLAN 0 to HW filter on device bond0 [ 476.321675][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 476.335524][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 476.365386][T21974] 8021q: adding VLAN 0 to HW filter on device team0 [ 476.387254][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 476.396830][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 476.425063][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 476.432162][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 476.464935][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 476.475570][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 476.494943][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 476.503461][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 476.510593][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 476.555099][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 476.563800][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 476.593839][T21982] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 476.623417][T21974] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 476.650541][T21974] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 476.680739][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 476.708965][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 476.718792][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 476.735673][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 476.755452][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 476.764156][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 476.822612][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 476.826559][T21983] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 476.831721][T12197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 476.841498][T21983] CPU: 0 PID: 21983 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #0 [ 476.856393][T21983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.866448][T21983] Call Trace: [ 476.869742][T21983] dump_stack+0x172/0x1f0 [ 476.874080][T21983] dump_header+0x10b/0x82d [ 476.878503][T21983] oom_kill_process.cold+0x10/0x15 [ 476.883619][T21983] out_of_memory+0x79a/0x12c0 [ 476.888302][T21983] ? __sched_text_start+0x8/0x8 [ 476.893163][T21983] ? oom_killer_disable+0x280/0x280 [ 476.898384][T21983] mem_cgroup_out_of_memory+0x1d8/0x240 [ 476.903487][T21974] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 476.903954][T21983] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 476.916323][T21983] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 476.922151][T21983] ? cgroup_file_notify+0x140/0x1b0 [ 476.927360][T21983] memory_max_write+0x262/0x3a0 [ 476.932216][T21983] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 476.939408][T21983] ? lock_acquire+0x190/0x410 [ 476.944319][T21983] ? kernfs_fop_write+0x227/0x480 [ 476.949362][T21983] cgroup_file_write+0x241/0x790 [ 476.954313][T21983] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 476.960323][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 476.961083][T21983] ? cgroup_migrate_add_task+0x890/0x890 [ 476.973873][T21983] ? cgroup_migrate_add_task+0x890/0x890 [ 476.975074][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 476.979511][T21983] kernfs_fop_write+0x2b8/0x480 [ 476.991443][T21983] __vfs_write+0x8a/0x110 [ 476.995771][T21983] ? kernfs_fop_open+0xd80/0xd80 [ 477.000709][T21983] vfs_write+0x268/0x5d0 [ 477.004956][T21983] ksys_write+0x14f/0x290 [ 477.009295][T21983] ? __ia32_sys_read+0xb0/0xb0 [ 477.014590][T21983] ? do_syscall_64+0x26/0x6a0 [ 477.019354][T21983] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.025434][T21983] ? do_syscall_64+0x26/0x6a0 [ 477.030135][T21983] __x64_sys_write+0x73/0xb0 [ 477.034741][T21983] do_syscall_64+0xfd/0x6a0 [ 477.039349][T21983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.045242][T21983] RIP: 0033:0x459879 [ 477.049143][T21983] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.068735][T21983] RSP: 002b:00007f8e64d00c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 477.077127][T21983] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459879 [ 477.085080][T21983] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 477.093041][T21983] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 477.100998][T21983] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8e64d016d4 [ 477.108950][T21983] R13: 00000000004c9a03 R14: 00000000004e10c8 R15: 00000000ffffffff [ 477.141869][T21983] memory: usage 5664kB, limit 0kB, failcnt 29 [ 477.149443][T21983] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 477.162979][T21983] Memory cgroup stats for /syz0: [ 477.163095][T21983] anon 2154496 [ 477.163095][T21983] file 540672 [ 477.163095][T21983] kernel_stack 65536 [ 477.163095][T21983] slab 3117056 [ 477.163095][T21983] sock 0 [ 477.163095][T21983] shmem 348160 [ 477.163095][T21983] file_mapped 0 [ 477.163095][T21983] file_dirty 0 [ 477.163095][T21983] file_writeback 0 [ 477.163095][T21983] anon_thp 2097152 [ 477.163095][T21983] inactive_anon 540672 [ 477.163095][T21983] active_anon 2154496 [ 477.163095][T21983] inactive_file 135168 [ 477.163095][T21983] active_file 0 [ 477.163095][T21983] unevictable 0 [ 477.163095][T21983] slab_reclaimable 1351680 [ 477.163095][T21983] slab_unreclaimable 1765376 [ 477.163095][T21983] pgfault 40425 [ 477.163095][T21983] pgmajfault 0 [ 477.163095][T21983] workingset_refault 0 [ 477.163095][T21983] workingset_activate 0 [ 477.163095][T21983] workingset_nodereclaim 0 [ 477.163095][T21983] pgrefill 0 [ 477.163095][T21983] pgscan 0 [ 477.163095][T21983] pgsteal 0 [ 477.163095][T21983] pgactivate 0 [ 477.264601][T21983] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=21981,uid=0 [ 477.295390][T21983] Memory cgroup out of memory: Killed process 21981 (syz-executor.0) total-vm:72712kB, anon-rss:2196kB, file-rss:35840kB, shmem-rss:0kB [ 477.310837][ T1058] oom_reaper: reaped process 21981 (syz-executor.0), now anon-rss:0kB, file-rss:34920kB, shmem-rss:0kB [ 477.426665][T21970] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 477.438178][T21970] CPU: 0 PID: 21970 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #0 [ 477.446075][T21970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.456128][T21970] Call Trace: [ 477.459419][T21970] dump_stack+0x172/0x1f0 [ 477.463748][T21970] dump_header+0x10b/0x82d [ 477.468158][T21970] ? oom_kill_process+0x94/0x3f0 [ 477.473094][T21970] oom_kill_process.cold+0x10/0x15 [ 477.478210][T21970] out_of_memory+0x79a/0x12c0 [ 477.482881][T21970] ? lock_downgrade+0x920/0x920 [ 477.487726][T21970] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 477.493528][T21970] ? oom_killer_disable+0x280/0x280 [ 477.498730][T21970] mem_cgroup_out_of_memory+0x1d8/0x240 [ 477.504397][T21970] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 477.510123][T21970] ? do_raw_spin_unlock+0x57/0x270 [ 477.515384][T21970] ? _raw_spin_unlock+0x2d/0x50 [ 477.520248][T21970] try_charge+0xf4b/0x1440 [ 477.524681][T21970] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 477.530217][T21970] ? percpu_ref_tryget_live+0x111/0x290 [ 477.535759][T21970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.542001][T21970] ? __kasan_check_read+0x11/0x20 [ 477.547127][T21970] ? get_mem_cgroup_from_mm+0x156/0x320 [ 477.552704][T21970] mem_cgroup_try_charge+0x136/0x590 [ 477.557993][T21970] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 477.563621][T21970] wp_page_copy+0x421/0x15e0 [ 477.568190][T21970] ? find_held_lock+0x35/0x130 [ 477.572932][T21970] ? pmd_pfn+0x1d0/0x1d0 [ 477.577197][T21970] ? lock_downgrade+0x920/0x920 [ 477.582045][T21970] ? swp_swapcount+0x540/0x540 [ 477.586787][T21970] ? __kasan_check_read+0x11/0x20 [ 477.591789][T21970] ? do_raw_spin_unlock+0x57/0x270 [ 477.596902][T21970] do_wp_page+0x499/0x14d0 [ 477.601388][T21970] ? finish_mkwrite_fault+0x570/0x570 [ 477.606749][T21970] __handle_mm_fault+0x22f7/0x3f20 [ 477.611926][T21970] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 477.617479][T21970] ? __kasan_check_read+0x11/0x20 [ 477.622586][T21970] handle_mm_fault+0x1b5/0x6b0 [ 477.627352][T21970] __do_page_fault+0x536/0xdd0 [ 477.632099][T21970] do_page_fault+0x38/0x590 [ 477.636610][T21970] page_fault+0x39/0x40 [ 477.640753][T21970] RIP: 0033:0x4034f2 [ 477.644634][T21970] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 a9 8d 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 c9 42 05 00 48 [ 477.664229][T21970] RSP: 002b:00007ffdc0461c50 EFLAGS: 00010246 [ 477.670287][T21970] RAX: 0000000000000000 RBX: 00000000000747ca RCX: 0000000000413480 [ 477.678254][T21970] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffdc0462d80 [ 477.686325][T21970] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555556922940 [ 477.694307][T21970] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdc0462d80 [ 477.702299][T21970] R13: 00007ffdc0462d70 R14: 0000000000000000 R15: 00007ffdc0462d80 [ 477.712121][T21970] memory: usage 3296kB, limit 0kB, failcnt 41 [ 477.718293][T21970] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 477.725614][T21970] Memory cgroup stats for /syz0: [ 477.725727][T21970] anon 61440 [ 477.725727][T21970] file 540672 [ 477.725727][T21970] kernel_stack 0 [ 477.725727][T21970] slab 3117056 [ 477.725727][T21970] sock 0 [ 477.725727][T21970] shmem 348160 [ 477.725727][T21970] file_mapped 0 [ 477.725727][T21970] file_dirty 0 [ 477.725727][T21970] file_writeback 0 [ 477.725727][T21970] anon_thp 0 [ 477.725727][T21970] inactive_anon 540672 [ 477.725727][T21970] active_anon 61440 [ 477.725727][T21970] inactive_file 135168 [ 477.725727][T21970] active_file 0 [ 477.725727][T21970] unevictable 0 [ 477.725727][T21970] slab_reclaimable 1351680 [ 477.725727][T21970] slab_unreclaimable 1765376 [ 477.725727][T21970] pgfault 40425 [ 477.725727][T21970] pgmajfault 0 [ 477.725727][T21970] workingset_refault 0 [ 477.725727][T21970] workingset_activate 0 [ 477.725727][T21970] workingset_nodereclaim 0 [ 477.725727][T21970] pgrefill 0 [ 477.725727][T21970] pgscan 0 [ 477.725727][T21970] pgsteal 0 [ 477.725727][T21970] pgactivate 0 [ 477.820309][T21970] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=21970,uid=0 [ 477.835845][T21970] Memory cgroup out of memory: Killed process 21970 (syz-executor.0) total-vm:72448kB, anon-rss:76kB, file-rss:34832kB, shmem-rss:0kB [ 477.851161][ T1058] oom_reaper: reaped process 21970 (syz-executor.0), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 482.116270][ T7] device bridge_slave_1 left promiscuous mode [ 482.122522][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.176737][ T7] device bridge_slave_0 left promiscuous mode [ 482.182971][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.246351][ T7] device bridge_slave_1 left promiscuous mode [ 482.252582][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.309522][ T7] device bridge_slave_0 left promiscuous mode [ 482.316811][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 490.095074][ T7] device hsr_slave_0 left promiscuous mode [ 490.134547][ T7] device hsr_slave_1 left promiscuous mode [ 490.200140][ T7] team0 (unregistering): Port device team_slave_1 removed [ 490.223919][ T7] team0 (unregistering): Port device team_slave_0 removed [ 490.250807][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 490.333708][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 490.483689][ T7] bond0 (unregistering): Released all slaves [ 490.655240][ T7] device hsr_slave_0 left promiscuous mode [ 490.695451][ T7] device hsr_slave_1 left promiscuous mode [ 490.758810][ T7] team0 (unregistering): Port device team_slave_1 removed [ 490.782366][ T7] team0 (unregistering): Port device team_slave_0 removed [ 490.810504][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 490.886268][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 491.043898][ T7] bond0 (unregistering): Released all slaves 00:52:48 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x0, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={0x0, 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) 00:52:48 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="230000004e00817491bc655067d7aee4050c00000f000100f0a30000000000008b1832", 0x23}], 0x1}, 0x0) 00:52:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000000), 0x70db2da734432a8e) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, &(0x7f0000000080), 0xfcf3) 00:52:48 executing program 5: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x5, 0x0, 0x0) 00:52:48 executing program 1: r0 = socket$kcm(0xa, 0x1000000000000001, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() r5 = perf_event_open(0x0, r4, 0x7, r3, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r7 = socket$kcm(0x29, 0x2, 0x0) r8 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r8, 0x29, 0x14, &(0x7f0000000040), 0x52d) close(r8) r9 = gettid() r10 = perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x0, 0x2, 0x0, 0x5cdc, 0x0, 0x1, 0xc1200, 0x4, 0x9, 0xc6, 0x6, 0x0, 0x1, 0x200, 0xe71, 0x5, 0x7, 0x0, 0x80, 0x5, 0x0, 0x2, 0x1, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x8, 0x1, 0x0, 0x8001, 0x0, @perf_bp={0x0, 0x9}, 0x6404, 0xe30, 0xcae1, 0x4}, r9, 0x0, 0xffffffffffffffff, 0x3) close(r5) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000000100)=0xf20) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000200)) close(r2) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20008844) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000140)={r0}) 00:52:48 executing program 0: r0 = socket$kcm(0xa, 0x1000000000000001, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() r5 = perf_event_open(0x0, r4, 0x7, r3, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r7 = socket$kcm(0x29, 0x2, 0x0) r8 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r8, 0x29, 0x14, &(0x7f0000000040), 0x52d) close(r8) r9 = gettid() r10 = perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x0, 0x2, 0x0, 0x5cdc, 0x0, 0x1, 0xc1200, 0x4, 0x9, 0xc6, 0x6, 0x0, 0x1, 0x200, 0xe71, 0x5, 0x7, 0x0, 0x80, 0x5, 0x0, 0x2, 0x1, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x8, 0x1, 0x0, 0x8001, 0x0, @perf_bp={0x0, 0x9}, 0x6404, 0xe30, 0xcae1, 0x4}, r9, 0x0, 0xffffffffffffffff, 0x3) close(r5) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000000100)=0xf20) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000200)) close(r2) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20008844) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000140)={r0}) 00:52:48 executing program 2: r0 = socket$kcm(0xa, 0x1000000000000001, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() r5 = perf_event_open(0x0, r4, 0x7, r3, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r7 = socket$kcm(0x29, 0x2, 0x0) r8 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r8, 0x29, 0x14, &(0x7f0000000040), 0x52d) close(r8) r9 = gettid() r10 = perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x0, 0x2, 0x0, 0x5cdc, 0x0, 0x1, 0xc1200, 0x4, 0x9, 0xc6, 0x6, 0x0, 0x1, 0x200, 0xe71, 0x5, 0x7, 0x0, 0x80, 0x5, 0x0, 0x2, 0x1, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x8, 0x1, 0x0, 0x8001, 0x0, @perf_bp={0x0, 0x9}, 0x6404, 0xe30, 0xcae1, 0x4}, r9, 0x0, 0xffffffffffffffff, 0x3) close(r5) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000000100)=0xf20) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000200)) close(r2) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20008844) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000140)={r0}) 00:52:48 executing program 4: r0 = socket$kcm(0xa, 0x1000000000000001, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() r5 = perf_event_open(0x0, r4, 0x7, r3, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r7 = socket$kcm(0x29, 0x2, 0x0) r8 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r8, 0x29, 0x14, &(0x7f0000000040), 0x52d) close(r8) r9 = gettid() r10 = perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x0, 0x2, 0x0, 0x5cdc, 0x0, 0x1, 0xc1200, 0x4, 0x9, 0xc6, 0x6, 0x0, 0x1, 0x200, 0xe71, 0x5, 0x7, 0x0, 0x80, 0x5, 0x0, 0x2, 0x1, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x8, 0x1, 0x0, 0x8001, 0x0, @perf_bp={0x0, 0x9}, 0x6404, 0xe30, 0xcae1, 0x4}, r9, 0x0, 0xffffffffffffffff, 0x3) close(r5) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000000100)=0xf20) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000200)) close(r2) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20008844) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000140)={r0}) 00:52:48 executing program 5: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x5, 0x0, 0x0) 00:52:48 executing program 1: r0 = socket$kcm(0xa, 0x1000000000000001, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() r5 = perf_event_open(0x0, r4, 0x7, r3, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r7 = socket$kcm(0x29, 0x2, 0x0) r8 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r8, 0x29, 0x14, &(0x7f0000000040), 0x52d) close(r8) r9 = gettid() r10 = perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x0, 0x2, 0x0, 0x5cdc, 0x0, 0x1, 0xc1200, 0x4, 0x9, 0xc6, 0x6, 0x0, 0x1, 0x200, 0xe71, 0x5, 0x7, 0x0, 0x80, 0x5, 0x0, 0x2, 0x1, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x8, 0x1, 0x0, 0x8001, 0x0, @perf_bp={0x0, 0x9}, 0x6404, 0xe30, 0xcae1, 0x4}, r9, 0x0, 0xffffffffffffffff, 0x3) close(r5) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000000100)=0xf20) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000200)) close(r2) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20008844) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000140)={r0}) 00:52:48 executing program 5: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x5, 0x0, 0x0) 00:52:48 executing program 5: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x5, 0x0, 0x0) [ 528.811546][T22029] IPVS: ftp: loaded support on port[0] = 21 [ 529.047702][T22029] chnl_net:caif_netlink_parms(): no params data found [ 529.071346][T22032] IPVS: ftp: loaded support on port[0] = 21 [ 529.097626][ T28] device bridge_slave_1 left promiscuous mode [ 529.103861][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 529.165567][ T28] device bridge_slave_0 left promiscuous mode [ 529.171767][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 530.984943][ T28] device hsr_slave_0 left promiscuous mode [ 531.044596][ T28] device hsr_slave_1 left promiscuous mode [ 531.113108][ T28] team0 (unregistering): Port device team_slave_1 removed [ 531.127257][ T28] team0 (unregistering): Port device team_slave_0 removed [ 531.138752][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 531.182996][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 531.281329][ T28] bond0 (unregistering): Released all slaves [ 531.388822][T22029] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.396126][T22029] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.403804][T22029] device bridge_slave_0 entered promiscuous mode [ 531.419887][T22029] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.427090][T22029] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.436351][T22029] device bridge_slave_1 entered promiscuous mode [ 531.453921][T22029] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 531.465570][T22029] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 531.562814][T22029] team0: Port device team_slave_0 added [ 531.573631][T22029] team0: Port device team_slave_1 added [ 531.657347][T22029] device hsr_slave_0 entered promiscuous mode [ 531.724820][T22029] device hsr_slave_1 entered promiscuous mode [ 531.780364][T22029] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.787500][T22029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 531.802527][T22032] chnl_net:caif_netlink_parms(): no params data found [ 531.905097][T22032] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.912527][T22032] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.921155][T22032] device bridge_slave_0 entered promiscuous mode [ 531.930130][T22032] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.939854][T22032] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.948388][T22032] device bridge_slave_1 entered promiscuous mode [ 531.971846][T22032] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 531.988130][T22029] 8021q: adding VLAN 0 to HW filter on device bond0 [ 532.002390][T22032] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 532.032358][T22029] 8021q: adding VLAN 0 to HW filter on device team0 [ 532.047743][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 532.061614][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 532.082319][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 532.092587][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 532.137941][T22032] team0: Port device team_slave_0 added [ 532.152316][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 532.173900][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 532.182917][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 532.190187][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 532.205767][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 532.220164][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 532.227709][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 532.269131][T22032] team0: Port device team_slave_1 added [ 532.285950][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 532.302091][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 532.312401][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 532.328682][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 532.343310][T22029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 532.373811][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 532.408457][T22029] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 532.440104][T22032] device hsr_slave_0 entered promiscuous mode [ 532.495095][T22032] device hsr_slave_1 entered promiscuous mode [ 532.554650][T22032] debugfs: Directory 'hsr0' with parent '/' already present! [ 532.636344][T22032] 8021q: adding VLAN 0 to HW filter on device bond0 [ 532.662944][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 532.687204][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 532.707489][T22032] 8021q: adding VLAN 0 to HW filter on device team0 [ 532.728181][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 532.746444][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 532.762273][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 532.769451][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 532.804061][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 532.843378][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 532.871891][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 532.881198][ T8785] bridge0: port 2(bridge_slave_1) entered blocking state [ 532.888332][ T8785] bridge0: port 2(bridge_slave_1) entered forwarding state [ 532.896755][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 532.905599][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 532.914167][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 532.922930][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 532.932974][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 532.947369][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 532.956471][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 532.967000][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 532.976452][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 532.990193][T22032] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 533.002191][T22032] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 533.010915][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 533.048532][T22032] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 533.162291][T22048] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 533.261337][T22048] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 533.273202][T22048] CPU: 1 PID: 22048 Comm: syz-executor.3 Not tainted 5.3.0-rc3+ #0 [ 533.281098][T22048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.291248][T22048] Call Trace: [ 533.294549][T22048] dump_stack+0x172/0x1f0 [ 533.298896][T22048] dump_header+0x10b/0x82d [ 533.303381][T22048] oom_kill_process.cold+0x10/0x15 [ 533.308506][T22048] out_of_memory+0x79a/0x12c0 [ 533.313176][T22048] ? __sched_text_start+0x8/0x8 [ 533.318031][T22048] ? oom_killer_disable+0x280/0x280 [ 533.323239][T22048] mem_cgroup_out_of_memory+0x1d8/0x240 [ 533.328772][T22048] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 533.334500][T22048] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 533.340314][T22048] ? cgroup_file_notify+0x140/0x1b0 [ 533.345612][T22048] memory_max_write+0x262/0x3a0 [ 533.350449][T22048] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 533.357301][T22048] ? lock_acquire+0x190/0x410 [ 533.361977][T22048] ? kernfs_fop_write+0x227/0x480 [ 533.366995][T22048] cgroup_file_write+0x241/0x790 [ 533.371928][T22048] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 533.378709][T22048] ? cgroup_migrate_add_task+0x890/0x890 [ 533.384376][T22048] ? cgroup_migrate_add_task+0x890/0x890 [ 533.390013][T22048] kernfs_fop_write+0x2b8/0x480 [ 533.394891][T22048] __vfs_write+0x8a/0x110 [ 533.399225][T22048] ? kernfs_fop_open+0xd80/0xd80 [ 533.404160][T22048] vfs_write+0x268/0x5d0 [ 533.408397][T22048] ksys_write+0x14f/0x290 [ 533.412970][T22048] ? __ia32_sys_read+0xb0/0xb0 [ 533.417738][T22048] ? do_syscall_64+0x26/0x6a0 [ 533.422412][T22048] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.428479][T22048] ? do_syscall_64+0x26/0x6a0 [ 533.433494][T22048] __x64_sys_write+0x73/0xb0 [ 533.438123][T22048] do_syscall_64+0xfd/0x6a0 [ 533.442712][T22048] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.448598][T22048] RIP: 0033:0x459879 [ 533.452496][T22048] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 533.472109][T22048] RSP: 002b:00007f48753b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 533.480508][T22048] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459879 [ 533.488461][T22048] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 533.496618][T22048] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 533.504600][T22048] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f48753b16d4 [ 533.512554][T22048] R13: 00000000004c9a03 R14: 00000000004e10c8 R15: 00000000ffffffff [ 533.532959][T22048] memory: usage 5316kB, limit 0kB, failcnt 180268 [ 533.540005][T22048] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 533.547136][T22048] Memory cgroup stats for /syz3: [ 533.547458][T22048] anon 2150400 [ 533.547458][T22048] file 208896 [ 533.547458][T22048] kernel_stack 0 [ 533.547458][T22048] slab 2994176 [ 533.547458][T22048] sock 0 [ 533.547458][T22048] shmem 0 [ 533.547458][T22048] file_mapped 0 [ 533.547458][T22048] file_dirty 135168 [ 533.547458][T22048] file_writeback 0 [ 533.547458][T22048] anon_thp 2097152 [ 533.547458][T22048] inactive_anon 0 [ 533.547458][T22048] active_anon 2150400 [ 533.547458][T22048] inactive_file 135168 [ 533.547458][T22048] active_file 0 [ 533.547458][T22048] unevictable 0 [ 533.547458][T22048] slab_reclaimable 1081344 [ 533.547458][T22048] slab_unreclaimable 1912832 [ 533.547458][T22048] pgfault 38445 [ 533.547458][T22048] pgmajfault 0 [ 533.547458][T22048] workingset_refault 0 [ 533.547458][T22048] workingset_activate 0 [ 533.547458][T22048] workingset_nodereclaim 0 [ 533.547458][T22048] pgrefill 0 [ 533.547458][T22048] pgscan 0 [ 533.547458][T22048] pgsteal 0 [ 533.547458][T22048] pgactivate 0 [ 533.647732][T22048] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=22046,uid=0 [ 533.663751][T22048] Memory cgroup out of memory: Killed process 22046 (syz-executor.3) total-vm:72580kB, anon-rss:2180kB, file-rss:35848kB, shmem-rss:0kB [ 533.680863][ T1058] oom_reaper: reaped process 22046 (syz-executor.3), now anon-rss:0kB, file-rss:34916kB, shmem-rss:0kB 00:52:54 executing program 4: r0 = socket$kcm(0xa, 0x1000000000000001, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() r5 = perf_event_open(0x0, r4, 0x7, r3, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r7 = socket$kcm(0x29, 0x2, 0x0) r8 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r8, 0x29, 0x14, &(0x7f0000000040), 0x52d) close(r8) r9 = gettid() r10 = perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x0, 0x2, 0x0, 0x5cdc, 0x0, 0x1, 0xc1200, 0x4, 0x9, 0xc6, 0x6, 0x0, 0x1, 0x200, 0xe71, 0x5, 0x7, 0x0, 0x80, 0x5, 0x0, 0x2, 0x1, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x8, 0x1, 0x0, 0x8001, 0x0, @perf_bp={0x0, 0x9}, 0x6404, 0xe30, 0xcae1, 0x4}, r9, 0x0, 0xffffffffffffffff, 0x3) close(r5) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000000100)=0xf20) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000200)) close(r2) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20008844) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000140)={r0}) 00:52:54 executing program 5: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 00:52:54 executing program 1: r0 = socket$kcm(0xa, 0x1000000000000001, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() r5 = perf_event_open(0x0, r4, 0x7, r3, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r7 = socket$kcm(0x29, 0x2, 0x0) r8 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r8, 0x29, 0x14, &(0x7f0000000040), 0x52d) close(r8) r9 = gettid() r10 = perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x0, 0x2, 0x0, 0x5cdc, 0x0, 0x1, 0xc1200, 0x4, 0x9, 0xc6, 0x6, 0x0, 0x1, 0x200, 0xe71, 0x5, 0x7, 0x0, 0x80, 0x5, 0x0, 0x2, 0x1, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x8, 0x1, 0x0, 0x8001, 0x0, @perf_bp={0x0, 0x9}, 0x6404, 0xe30, 0xcae1, 0x4}, r9, 0x0, 0xffffffffffffffff, 0x3) close(r5) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000000100)=0xf20) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000200)) close(r2) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20008844) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000140)={r0}) 00:52:54 executing program 2: r0 = socket$kcm(0xa, 0x1000000000000001, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() r5 = perf_event_open(0x0, r4, 0x7, r3, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r7 = socket$kcm(0x29, 0x2, 0x0) r8 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r8, 0x29, 0x14, &(0x7f0000000040), 0x52d) close(r8) r9 = gettid() r10 = perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x0, 0x2, 0x0, 0x5cdc, 0x0, 0x1, 0xc1200, 0x4, 0x9, 0xc6, 0x6, 0x0, 0x1, 0x200, 0xe71, 0x5, 0x7, 0x0, 0x80, 0x5, 0x0, 0x2, 0x1, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x8, 0x1, 0x0, 0x8001, 0x0, @perf_bp={0x0, 0x9}, 0x6404, 0xe30, 0xcae1, 0x4}, r9, 0x0, 0xffffffffffffffff, 0x3) close(r5) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000000100)=0xf20) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000200)) close(r2) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20008844) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000140)={r0}) 00:52:54 executing program 0: r0 = socket$kcm(0xa, 0x1000000000000001, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() r5 = perf_event_open(0x0, r4, 0x7, r3, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r7 = socket$kcm(0x29, 0x2, 0x0) r8 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r8, 0x29, 0x14, &(0x7f0000000040), 0x52d) close(r8) r9 = gettid() r10 = perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x0, 0x2, 0x0, 0x5cdc, 0x0, 0x1, 0xc1200, 0x4, 0x9, 0xc6, 0x6, 0x0, 0x1, 0x200, 0xe71, 0x5, 0x7, 0x0, 0x80, 0x5, 0x0, 0x2, 0x1, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x8, 0x1, 0x0, 0x8001, 0x0, @perf_bp={0x0, 0x9}, 0x6404, 0xe30, 0xcae1, 0x4}, r9, 0x0, 0xffffffffffffffff, 0x3) close(r5) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000000100)=0xf20) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000200)) close(r2) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20008844) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000140)={r0}) 00:52:55 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x480}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f00000001c0)=0xffffffff000) [ 533.850936][T22032] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 533.906880][T22032] CPU: 0 PID: 22032 Comm: syz-executor.3 Not tainted 5.3.0-rc3+ #0 [ 533.914816][T22032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.924885][T22032] Call Trace: [ 533.928201][T22032] dump_stack+0x172/0x1f0 [ 533.932575][T22032] dump_header+0x10b/0x82d [ 533.936998][T22032] ? oom_kill_process+0x94/0x3f0 [ 533.941970][T22032] oom_kill_process.cold+0x10/0x15 [ 533.947088][T22032] out_of_memory+0x79a/0x12c0 [ 533.951795][T22032] ? lock_downgrade+0x920/0x920 [ 533.956742][T22032] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 533.962564][T22032] ? oom_killer_disable+0x280/0x280 [ 533.967920][T22032] mem_cgroup_out_of_memory+0x1d8/0x240 [ 533.973501][T22032] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 533.979175][T22032] ? do_raw_spin_unlock+0x57/0x270 [ 533.984305][T22032] ? _raw_spin_unlock+0x2d/0x50 [ 533.989189][T22032] try_charge+0xf4b/0x1440 [ 533.993616][T22032] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 533.999167][T22032] ? percpu_ref_tryget_live+0x111/0x290 [ 533.999184][T22032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 533.999200][T22032] ? __kasan_check_read+0x11/0x20 [ 533.999219][T22032] ? get_mem_cgroup_from_mm+0x156/0x320 [ 533.999239][T22032] mem_cgroup_try_charge+0x136/0x590 [ 534.027468][T22032] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 534.033122][T22032] wp_page_copy+0x421/0x15e0 [ 534.037837][T22032] ? find_held_lock+0x35/0x130 [ 534.042629][T22032] ? pmd_pfn+0x1d0/0x1d0 [ 534.046891][T22032] ? lock_downgrade+0x920/0x920 [ 534.051765][T22032] ? swp_swapcount+0x540/0x540 [ 534.056545][T22032] ? __kasan_check_read+0x11/0x20 [ 534.061580][T22032] ? do_raw_spin_unlock+0x57/0x270 [ 534.066714][T22032] do_wp_page+0x499/0x14d0 [ 534.071166][T22032] ? finish_mkwrite_fault+0x570/0x570 [ 534.076563][T22032] __handle_mm_fault+0x22f7/0x3f20 [ 534.081689][T22032] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 534.087259][T22032] ? __kasan_check_read+0x11/0x20 [ 534.092303][T22032] handle_mm_fault+0x1b5/0x6b0 [ 534.097091][T22032] __do_page_fault+0x536/0xdd0 [ 534.101884][T22032] do_page_fault+0x38/0x590 00:52:55 executing program 2: r0 = socket$kcm(0xa, 0x1000000000000001, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() r5 = perf_event_open(0x0, r4, 0x7, r3, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r7 = socket$kcm(0x29, 0x2, 0x0) r8 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r8, 0x29, 0x14, &(0x7f0000000040), 0x52d) close(r8) r9 = gettid() r10 = perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x0, 0x2, 0x0, 0x5cdc, 0x0, 0x1, 0xc1200, 0x4, 0x9, 0xc6, 0x6, 0x0, 0x1, 0x200, 0xe71, 0x5, 0x7, 0x0, 0x80, 0x5, 0x0, 0x2, 0x1, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x8, 0x1, 0x0, 0x8001, 0x0, @perf_bp={0x0, 0x9}, 0x6404, 0xe30, 0xcae1, 0x4}, r9, 0x0, 0xffffffffffffffff, 0x3) close(r5) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000000100)=0xf20) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000200)) close(r2) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20008844) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000140)={r0}) 00:52:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) getpid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088ca010000000000000063a377fbac141414e9", 0x0, 0x100}, 0x28) sendmsg(r1, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[]}, 0x800) [ 534.106411][T22032] page_fault+0x39/0x40 [ 534.110566][T22032] RIP: 0033:0x430956 [ 534.114455][T22032] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 46 64 00 85 c0 0f 84 [ 534.114462][T22032] RSP: 002b:00007ffeac8552a0 EFLAGS: 00010206 [ 534.114473][T22032] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 534.114480][T22032] RDX: 0000555555ee3930 RSI: 0000555555eeb970 RDI: 0000000000000003 [ 534.114488][T22032] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555555ee2940 [ 534.114495][T22032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 534.114502][T22032] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 534.178567][T22032] memory: usage 2980kB, limit 0kB, failcnt 180276 00:52:55 executing program 4: r0 = socket$kcm(0xa, 0x1000000000000001, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() r5 = perf_event_open(0x0, r4, 0x7, r3, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r7 = socket$kcm(0x29, 0x2, 0x0) r8 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r8, 0x29, 0x14, &(0x7f0000000040), 0x52d) close(r8) r9 = gettid() r10 = perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x0, 0x2, 0x0, 0x5cdc, 0x0, 0x1, 0xc1200, 0x4, 0x9, 0xc6, 0x6, 0x0, 0x1, 0x200, 0xe71, 0x5, 0x7, 0x0, 0x80, 0x5, 0x0, 0x2, 0x1, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x8, 0x1, 0x0, 0x8001, 0x0, @perf_bp={0x0, 0x9}, 0x6404, 0xe30, 0xcae1, 0x4}, r9, 0x0, 0xffffffffffffffff, 0x3) close(r5) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000000100)=0xf20) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000200)) close(r2) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20008844) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000140)={r0}) 00:52:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003700000bfa30000000000000702000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d420500000000006502faff000000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) [ 534.208148][T22032] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 534.234386][T22032] Memory cgroup stats for /syz3: [ 534.234487][T22032] anon 0 [ 534.234487][T22032] file 208896 [ 534.234487][T22032] kernel_stack 0 [ 534.234487][T22032] slab 2994176 [ 534.234487][T22032] sock 0 [ 534.234487][T22032] shmem 0 [ 534.234487][T22032] file_mapped 0 [ 534.234487][T22032] file_dirty 135168 [ 534.234487][T22032] file_writeback 0 [ 534.234487][T22032] anon_thp 0 [ 534.234487][T22032] inactive_anon 0 [ 534.234487][T22032] active_anon 0 [ 534.234487][T22032] inactive_file 135168 [ 534.234487][T22032] active_file 0 [ 534.234487][T22032] unevictable 0 [ 534.234487][T22032] slab_reclaimable 1081344 [ 534.234487][T22032] slab_unreclaimable 1912832 [ 534.234487][T22032] pgfault 38445 [ 534.234487][T22032] pgmajfault 0 [ 534.234487][T22032] workingset_refault 0 00:52:55 executing program 0: r0 = socket$kcm(0xa, 0x1000000000000001, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() r5 = perf_event_open(0x0, r4, 0x7, r3, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r7 = socket$kcm(0x29, 0x2, 0x0) r8 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r8, 0x29, 0x14, &(0x7f0000000040), 0x52d) close(r8) r9 = gettid() r10 = perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x0, 0x2, 0x0, 0x5cdc, 0x0, 0x1, 0xc1200, 0x4, 0x9, 0xc6, 0x6, 0x0, 0x1, 0x200, 0xe71, 0x5, 0x7, 0x0, 0x80, 0x5, 0x0, 0x2, 0x1, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x9, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x8, 0x1, 0x0, 0x8001, 0x0, @perf_bp={0x0, 0x9}, 0x6404, 0xe30, 0xcae1, 0x4}, r9, 0x0, 0xffffffffffffffff, 0x3) close(r5) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000000100)=0xf20) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000200)) close(r2) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20008844) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000140)={r0}) 00:52:55 executing program 5: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 534.234487][T22032] workingset_activate 0 [ 534.234487][T22032] workingset_nodereclaim 0 [ 534.234487][T22032] pgrefill 0 [ 534.234487][T22032] pgscan 0 [ 534.234487][T22032] pgsteal 0 [ 534.234487][T22032] pgactivate 0 00:52:55 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) 00:52:55 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) r2 = perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x1, 0x6, 0xc1a1, 0x10000, 0x0, 0x0, 0x90000, 0x0, 0x4a, 0x40c, 0x40, 0x3, 0x0, 0x0, 0x3ff, 0x80, 0x93d, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x8001, 0x5, 0x0, 0x2d, 0x7fffffff, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000080), 0xa}, 0x0, 0xd7, 0x7fff, 0x0, 0x1, 0xfffffffffffffffe}, 0xffffffffffffffff, 0xe, r0, 0x6) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0xd, 0x1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='\x00') close(r0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x26000) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) close(r3) unlink(&(0x7f00000000c0)='./file0\x00') socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000000)='&@[\x00') openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={0xffffffffffffffff, 0x1, 0x18}, 0xc) recvmsg(r1, &(0x7f00000084c0)={&(0x7f0000006100)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000007440)=[{&(0x7f0000006180)=""/177, 0xb1}, {&(0x7f0000006240)=""/187, 0xbb}, {&(0x7f0000006300)=""/75, 0x4b}, {0x0}, {&(0x7f0000006440)=""/4096, 0x1000}], 0x5, &(0x7f00000074c0)=""/4096, 0x1000}, 0x0) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000008500), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000085c0)={0xd, 0xb, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x32a}, [@generic={0x7, 0x3ff, 0x1, 0x3}, @map={0x18, 0x8, 0x1, 0x0, r4}, @jmp={0x5, 0x1, 0xb, 0x4, 0x1, 0xffffffffffffffe0, 0x4}, @jmp={0x5, 0x8, 0x5, 0xe, 0xb, 0x30, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0xd}, @exit, @generic={0x0, 0xc6, 0xa20, 0x9}]}, &(0x7f0000000640)='GPL\x00', 0x34, 0x40, &(0x7f0000000900)=""/64, 0x41100, 0x1, [], r5, 0xd, r6, 0x8, &(0x7f0000008540)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000008580)={0x3, 0x8, 0x3, 0x1}, 0x10}, 0x70) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r7, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r3, 0x0, 0x17, &(0x7f00000003c0)='cgroup.subtree_control\x00', 0xffffffffffffffff}, 0x30) close(r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000580)={0x2, 0x8, 0x10000, 0x4}, &(0x7f00000005c0)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0xa987}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000840)={r8, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000004c0)='&@[\x00', r9}, 0x30) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000680)='&@[\x00') socket$kcm(0x29, 0x2, 0x0) 00:52:55 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x180, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 00:52:55 executing program 5: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 00:52:55 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) [ 534.759525][T22032] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=22032,uid=0 [ 534.840769][T22032] Memory cgroup out of memory: Killed process 22032 (syz-executor.3) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB [ 534.919488][ T1058] oom_reaper: reaped process 22032 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 00:52:56 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x11, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0xffffffffffffffb7) r0 = socket$kcm(0x2, 0x3, 0x84) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x3, 0x80007, 0xc4e, &(0x7f0000000200)) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) getpid() ioctl$TUNSETTXFILTER(r1, 0x400454d1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000040)="63cee2ec881bdcba676a09f0b8a16f8c67c1c6524d0de5f095cee607e6cc0fc8d73782deb7ee8a464974956127dd3f7c423987860127ce3e4dea9d", 0x0, 0x2}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x1, 0x0, 0x1ff, 0x0, 0x80000000, 0x20000, 0x0, 0x0, 0x5, 0x0, 0x28, 0x20, 0x2, 0x0, 0x8c, 0x400, 0xa, 0xa2, 0x5, 0x2, 0x6, 0x6, 0xe1, 0x8, 0x0, 0x9, 0x81, 0x10000, 0x7bd7, 0x4, 0x7, 0xfffffffffffff9f6, 0x5, 0x8, 0x24, 0x0, 0xbd, 0x0, @perf_config_ext={0x46a, 0x2}, 0x4, 0x1, 0x7, 0x7, 0x2, 0x0, 0xfffffffffffeffff}, r2, 0x9, r2, 0x5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x40000b) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(r2, &(0x7f00000004c0)='io.stat\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)=0x8, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) write$cgroup_pid(r3, &(0x7f0000000000), 0xcbaa60f5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000480)={0xffffffffffffffff, 0x0, &(0x7f0000000640)="b3e1abab2d4aac63438b393e574b92cd8ba1e0e40cedd56657a8efe31346d08edbbac1c557fab89ad186c4bfa2fa1ae5ef486398714d443631f2c7db4e9831176bdd129ce2d7c8bf9e7e56027d1fda22b63416867f1e31010d79f44770b10beac09b5b9248096ef8c24f8afcdae1ab7b35b5bc4fdf2676be5906d50b9a474e2287"}, 0x20) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x44) sendmsg$kcm(r0, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@abs={0x0, 0x0, 0x4e23}, 0x4d, 0x0, 0x0, 0x0, 0x0, 0xf401}, 0x0) 00:52:56 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x180, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 00:52:56 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) 00:52:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) getpid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088ca010000000000000063a377fbac141414e9", 0x0, 0x100}, 0x28) sendmsg(r1, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[]}, 0x800) 00:52:56 executing program 5: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 00:52:56 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) 00:52:56 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x180, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 00:52:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x3}, [@call={0x85, 0x0, 0x0, 0x6}]}, &(0x7f0000000040)='gPH\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:52:57 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) r2 = perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x1, 0x6, 0xc1a1, 0x10000, 0x0, 0x0, 0x90000, 0x0, 0x4a, 0x40c, 0x40, 0x3, 0x0, 0x0, 0x3ff, 0x80, 0x93d, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x8001, 0x5, 0x0, 0x2d, 0x7fffffff, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000080), 0xa}, 0x0, 0xd7, 0x7fff, 0x0, 0x1, 0xfffffffffffffffe}, 0xffffffffffffffff, 0xe, r0, 0x6) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0xd, 0x1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='\x00') close(r0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x26000) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) close(r3) unlink(&(0x7f00000000c0)='./file0\x00') socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000000)='&@[\x00') openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={0xffffffffffffffff, 0x1, 0x18}, 0xc) recvmsg(r1, &(0x7f00000084c0)={&(0x7f0000006100)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000007440)=[{&(0x7f0000006180)=""/177, 0xb1}, {&(0x7f0000006240)=""/187, 0xbb}, {&(0x7f0000006300)=""/75, 0x4b}, {0x0}, {&(0x7f0000006440)=""/4096, 0x1000}], 0x5, &(0x7f00000074c0)=""/4096, 0x1000}, 0x0) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000008500), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000085c0)={0xd, 0xb, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x32a}, [@generic={0x7, 0x3ff, 0x1, 0x3}, @map={0x18, 0x8, 0x1, 0x0, r4}, @jmp={0x5, 0x1, 0xb, 0x4, 0x1, 0xffffffffffffffe0, 0x4}, @jmp={0x5, 0x8, 0x5, 0xe, 0xb, 0x30, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0xd}, @exit, @generic={0x0, 0xc6, 0xa20, 0x9}]}, &(0x7f0000000640)='GPL\x00', 0x34, 0x40, &(0x7f0000000900)=""/64, 0x41100, 0x1, [], r5, 0xd, r6, 0x8, &(0x7f0000008540)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000008580)={0x3, 0x8, 0x3, 0x1}, 0x10}, 0x70) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r7, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r3, 0x0, 0x17, &(0x7f00000003c0)='cgroup.subtree_control\x00', 0xffffffffffffffff}, 0x30) close(r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000580)={0x2, 0x8, 0x10000, 0x4}, &(0x7f00000005c0)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0xa987}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000840)={r8, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000004c0)='&@[\x00', r9}, 0x30) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000680)='&@[\x00') socket$kcm(0x29, 0x2, 0x0) 00:52:57 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x180, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 00:52:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() perf_event_open(0x0, 0x0, 0x4, r0, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x8, 0xc8, 0x100000001, 0x8000, 0x0, 0x0, 0x0, 0xfffffffffffff4e4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x449}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf598e33}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) 00:52:57 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000000)={r0, &(0x7f00000001c0), 0x0}, 0x20) 00:52:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) getpid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088ca010000000000000063a377fbac141414e9", 0x0, 0x100}, 0x28) sendmsg(r1, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[]}, 0x800) 00:52:57 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000000)={r0, &(0x7f00000001c0), 0x0}, 0x20) 00:52:57 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000012540), 0x4) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x100, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0xa0008000]}, 0x2c) r3 = gettid() perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x8, 0x6, 0x6, 0x7, 0x0, 0xffff, 0x8000, 0x4, 0x1, 0x0, 0x2, 0x100, 0x4, 0x3, 0x101, 0x7fff, 0x7, 0x8, 0x6, 0x5, 0x1000, 0x2, 0x1d00000000, 0x1c7, 0x1, 0x0, 0x7, 0x9, 0x5, 0x6, 0x8, 0x5, 0x3, 0x1, 0x9, 0x1000, 0x0, 0x0, 0x1fe512c7914716da, @perf_bp={&(0x7f0000000000), 0x8}, 0x680, 0x9, 0x800, 0x2, 0x1, 0x0, 0x5}, r3, 0xe, r2, 0x1) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r4 = socket$kcm(0xa, 0x6, 0x0) sendmsg$kcm(r4, &(0x7f00000013c0)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000580)={r0, r5}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r3, r1, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, 0x0, 0xffb5) 00:52:57 executing program 4: r0 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251}, 0x48) 00:52:57 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000000)={r0, &(0x7f00000001c0), 0x0}, 0x20) 00:52:58 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000000)={r0, &(0x7f00000001c0), 0x0}, 0x20) 00:52:58 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000340)=""/124, 0x7c}, {&(0x7f00000003c0)=""/117, 0x75}, {&(0x7f0000000440)=""/103, 0x67}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000640)=""/113, 0x71}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000140)}], 0x8}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x40) r3 = socket$kcm(0x11, 0x6, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000900)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f807101086ca345cb5b2aa1f568a6f8fa813edf09a99c8182227260991baaa80caa3a6157365b850f06bb83dc3628178b045971c88361660afb0709c"], 0x0, 0x7f, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, 0xffffffffffffffff, 0x0, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000140)=r4, 0x4) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x10001) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 537.271457][T22166] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 537.533120][T22162] IPVS: ftp: loaded support on port[0] = 21 [ 537.780217][T22162] chnl_net:caif_netlink_parms(): no params data found [ 537.809266][T22162] bridge0: port 1(bridge_slave_0) entered blocking state [ 537.816473][T22162] bridge0: port 1(bridge_slave_0) entered disabled state [ 537.824153][T22162] device bridge_slave_0 entered promiscuous mode [ 537.832149][T22162] bridge0: port 2(bridge_slave_1) entered blocking state [ 537.839707][T22162] bridge0: port 2(bridge_slave_1) entered disabled state [ 537.847825][T22162] device bridge_slave_1 entered promiscuous mode [ 537.931914][T22162] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 537.944764][T22162] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 538.036648][T22162] team0: Port device team_slave_0 added [ 538.043526][T22162] team0: Port device team_slave_1 added [ 538.106288][T22162] device hsr_slave_0 entered promiscuous mode [ 538.155336][T22162] device hsr_slave_1 entered promiscuous mode [ 538.194527][T22162] debugfs: Directory 'hsr0' with parent '/' already present! [ 538.273950][T22162] bridge0: port 2(bridge_slave_1) entered blocking state [ 538.281073][T22162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 538.288462][T22162] bridge0: port 1(bridge_slave_0) entered blocking state [ 538.295556][T22162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 538.326483][ T608] device bridge_slave_1 left promiscuous mode [ 538.332701][ T608] bridge0: port 2(bridge_slave_1) entered disabled state [ 538.385811][ T608] device bridge_slave_0 left promiscuous mode [ 538.392078][ T608] bridge0: port 1(bridge_slave_0) entered disabled state [ 540.314767][ T608] device hsr_slave_0 left promiscuous mode [ 540.354568][ T608] device hsr_slave_1 left promiscuous mode [ 540.412828][ T608] team0 (unregistering): Port device team_slave_1 removed [ 540.427882][ T608] team0 (unregistering): Port device team_slave_0 removed [ 540.439571][ T608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 540.488783][ T608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 540.582637][ T608] bond0 (unregistering): Released all slaves [ 540.697312][ T8781] bridge0: port 1(bridge_slave_0) entered disabled state [ 540.706140][ T8781] bridge0: port 2(bridge_slave_1) entered disabled state [ 540.719004][T22162] 8021q: adding VLAN 0 to HW filter on device bond0 [ 540.740317][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 540.749642][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 540.759681][T22162] 8021q: adding VLAN 0 to HW filter on device team0 [ 540.771681][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 540.780727][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 540.789646][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 540.796920][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 540.864436][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 540.884724][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 540.893386][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 540.900495][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 540.914721][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 540.923668][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 540.933358][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 540.942322][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 540.951118][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 540.969865][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 540.979041][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 540.998965][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 541.008009][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 541.016907][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 541.033792][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 541.053964][T22162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 541.081283][T22162] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 541.199511][T22182] [ 541.202010][T22182] ********************************************************** [ 541.221602][T22182] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 541.238927][T22182] ** ** [ 541.246939][T22182] ** trace_printk() being used. Allocating extra memory. ** [ 541.256090][T22182] ** ** [ 541.263721][T22182] ** This means that this is a DEBUG kernel and it is ** [ 541.271856][T22182] ** unsafe for production use. ** [ 541.280053][T22182] ** ** [ 541.287904][T22182] ** If you see this message and you are not debugging ** 00:53:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x3}, [@call={0x85, 0x0, 0x0, 0x6}]}, &(0x7f0000000040)='gPH\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:53:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x15, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x3, 0x7, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:53:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000012540), 0x4) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x100, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0xa0008000]}, 0x2c) r3 = gettid() perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x8, 0x6, 0x6, 0x7, 0x0, 0xffff, 0x8000, 0x4, 0x1, 0x0, 0x2, 0x100, 0x4, 0x3, 0x101, 0x7fff, 0x7, 0x8, 0x6, 0x5, 0x1000, 0x2, 0x1d00000000, 0x1c7, 0x1, 0x0, 0x7, 0x9, 0x5, 0x6, 0x8, 0x5, 0x3, 0x1, 0x9, 0x1000, 0x0, 0x0, 0x1fe512c7914716da, @perf_bp={&(0x7f0000000000), 0x8}, 0x680, 0x9, 0x800, 0x2, 0x1, 0x0, 0x5}, r3, 0xe, r2, 0x1) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r4 = socket$kcm(0xa, 0x6, 0x0) sendmsg$kcm(r4, &(0x7f00000013c0)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000580)={r0, r5}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r3, r1, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, 0x0, 0xffb5) 00:53:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) getpid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088ca010000000000000063a377fbac141414e9", 0x0, 0x100}, 0x28) sendmsg(r1, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[]}, 0x800) 00:53:02 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000340)=""/124, 0x7c}, {&(0x7f00000003c0)=""/117, 0x75}, {&(0x7f0000000440)=""/103, 0x67}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000640)=""/113, 0x71}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000140)}], 0x8}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x40) r3 = socket$kcm(0x11, 0x6, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000900)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f807101086ca345cb5b2aa1f568a6f8fa813edf09a99c8182227260991baaa80caa3a6157365b850f06bb83dc3628178b045971c88361660afb0709c"], 0x0, 0x7f, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, 0xffffffffffffffff, 0x0, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000140)=r4, 0x4) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x10001) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 541.295706][T22182] ** the kernel, report this immediately to your vendor! ** [ 541.303178][T22182] ** ** [ 541.311101][T22182] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 541.318960][T22182] ********************************************************** 00:53:02 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) r2 = perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x1, 0x6, 0xc1a1, 0x10000, 0x0, 0x0, 0x90000, 0x0, 0x4a, 0x40c, 0x40, 0x3, 0x0, 0x0, 0x3ff, 0x80, 0x93d, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x8001, 0x5, 0x0, 0x2d, 0x7fffffff, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000080), 0xa}, 0x0, 0xd7, 0x7fff, 0x0, 0x1, 0xfffffffffffffffe}, 0xffffffffffffffff, 0xe, r0, 0x6) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0xd, 0x1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='\x00') close(r0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x26000) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) close(r3) unlink(&(0x7f00000000c0)='./file0\x00') socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000000)='&@[\x00') openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={0xffffffffffffffff, 0x1, 0x18}, 0xc) recvmsg(r1, &(0x7f00000084c0)={&(0x7f0000006100)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000007440)=[{&(0x7f0000006180)=""/177, 0xb1}, {&(0x7f0000006240)=""/187, 0xbb}, {&(0x7f0000006300)=""/75, 0x4b}, {0x0}, {&(0x7f0000006440)=""/4096, 0x1000}], 0x5, &(0x7f00000074c0)=""/4096, 0x1000}, 0x0) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000008500), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000085c0)={0xd, 0xb, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x32a}, [@generic={0x7, 0x3ff, 0x1, 0x3}, @map={0x18, 0x8, 0x1, 0x0, r4}, @jmp={0x5, 0x1, 0xb, 0x4, 0x1, 0xffffffffffffffe0, 0x4}, @jmp={0x5, 0x8, 0x5, 0xe, 0xb, 0x30, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0xd}, @exit, @generic={0x0, 0xc6, 0xa20, 0x9}]}, &(0x7f0000000640)='GPL\x00', 0x34, 0x40, &(0x7f0000000900)=""/64, 0x41100, 0x1, [], r5, 0xd, r6, 0x8, &(0x7f0000008540)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000008580)={0x3, 0x8, 0x3, 0x1}, 0x10}, 0x70) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r7, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r3, 0x0, 0x17, &(0x7f00000003c0)='cgroup.subtree_control\x00', 0xffffffffffffffff}, 0x30) close(r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000580)={0x2, 0x8, 0x10000, 0x4}, &(0x7f00000005c0)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0xa987}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000840)={r8, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000004c0)='&@[\x00', r9}, 0x30) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000680)='&@[\x00') socket$kcm(0x29, 0x2, 0x0) 00:53:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x15, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x3, 0x7, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:53:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x3}, [@call={0x85, 0x0, 0x0, 0x6}]}, &(0x7f0000000040)='gPH\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:53:02 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000340)=""/124, 0x7c}, {&(0x7f00000003c0)=""/117, 0x75}, {&(0x7f0000000440)=""/103, 0x67}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000640)=""/113, 0x71}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000140)}], 0x8}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x40) r3 = socket$kcm(0x11, 0x6, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000900)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f807101086ca345cb5b2aa1f568a6f8fa813edf09a99c8182227260991baaa80caa3a6157365b850f06bb83dc3628178b045971c88361660afb0709c"], 0x0, 0x7f, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, 0xffffffffffffffff, 0x0, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000140)=r4, 0x4) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x10001) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 00:53:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x3}, [@call={0x85, 0x0, 0x0, 0x6}]}, &(0x7f0000000040)='gPH\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:53:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x15, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x3, 0x7, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:53:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000012540), 0x4) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x100, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0xa0008000]}, 0x2c) r3 = gettid() perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x8, 0x6, 0x6, 0x7, 0x0, 0xffff, 0x8000, 0x4, 0x1, 0x0, 0x2, 0x100, 0x4, 0x3, 0x101, 0x7fff, 0x7, 0x8, 0x6, 0x5, 0x1000, 0x2, 0x1d00000000, 0x1c7, 0x1, 0x0, 0x7, 0x9, 0x5, 0x6, 0x8, 0x5, 0x3, 0x1, 0x9, 0x1000, 0x0, 0x0, 0x1fe512c7914716da, @perf_bp={&(0x7f0000000000), 0x8}, 0x680, 0x9, 0x800, 0x2, 0x1, 0x0, 0x5}, r3, 0xe, r2, 0x1) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r4 = socket$kcm(0xa, 0x6, 0x0) sendmsg$kcm(r4, &(0x7f00000013c0)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000580)={r0, r5}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r3, r1, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, 0x0, 0xffb5) 00:53:03 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000340)=""/124, 0x7c}, {&(0x7f00000003c0)=""/117, 0x75}, {&(0x7f0000000440)=""/103, 0x67}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000640)=""/113, 0x71}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000140)}], 0x8}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x40) r3 = socket$kcm(0x11, 0x6, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000900)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f807101086ca345cb5b2aa1f568a6f8fa813edf09a99c8182227260991baaa80caa3a6157365b850f06bb83dc3628178b045971c88361660afb0709c"], 0x0, 0x7f, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, 0xffffffffffffffff, 0x0, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000140)=r4, 0x4) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x10001) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 00:53:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x15, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x3, 0x7, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:53:03 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000340)=""/124, 0x7c}, {&(0x7f00000003c0)=""/117, 0x75}, {&(0x7f0000000440)=""/103, 0x67}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000640)=""/113, 0x71}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000140)}], 0x8}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x40) r3 = socket$kcm(0x11, 0x6, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000900)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f807101086ca345cb5b2aa1f568a6f8fa813edf09a99c8182227260991baaa80caa3a6157365b850f06bb83dc3628178b045971c88361660afb0709c"], 0x0, 0x7f, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, 0xffffffffffffffff, 0x0, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000140)=r4, 0x4) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x10001) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 542.369279][T22222] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:53:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000012540), 0x4) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x100, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0xa0008000]}, 0x2c) r3 = gettid() perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x8, 0x6, 0x6, 0x7, 0x0, 0xffff, 0x8000, 0x4, 0x1, 0x0, 0x2, 0x100, 0x4, 0x3, 0x101, 0x7fff, 0x7, 0x8, 0x6, 0x5, 0x1000, 0x2, 0x1d00000000, 0x1c7, 0x1, 0x0, 0x7, 0x9, 0x5, 0x6, 0x8, 0x5, 0x3, 0x1, 0x9, 0x1000, 0x0, 0x0, 0x1fe512c7914716da, @perf_bp={&(0x7f0000000000), 0x8}, 0x680, 0x9, 0x800, 0x2, 0x1, 0x0, 0x5}, r3, 0xe, r2, 0x1) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r4 = socket$kcm(0xa, 0x6, 0x0) sendmsg$kcm(r4, &(0x7f00000013c0)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000580)={r0, r5}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r3, r1, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, 0x0, 0xffb5) 00:53:03 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) r2 = perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x1, 0x6, 0xc1a1, 0x10000, 0x0, 0x0, 0x90000, 0x0, 0x4a, 0x40c, 0x40, 0x3, 0x0, 0x0, 0x3ff, 0x80, 0x93d, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x8001, 0x5, 0x0, 0x2d, 0x7fffffff, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000080), 0xa}, 0x0, 0xd7, 0x7fff, 0x0, 0x1, 0xfffffffffffffffe}, 0xffffffffffffffff, 0xe, r0, 0x6) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0xd, 0x1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='\x00') close(r0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x26000) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) close(r3) unlink(&(0x7f00000000c0)='./file0\x00') socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000000)='&@[\x00') openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={0xffffffffffffffff, 0x1, 0x18}, 0xc) recvmsg(r1, &(0x7f00000084c0)={&(0x7f0000006100)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000007440)=[{&(0x7f0000006180)=""/177, 0xb1}, {&(0x7f0000006240)=""/187, 0xbb}, {&(0x7f0000006300)=""/75, 0x4b}, {0x0}, {&(0x7f0000006440)=""/4096, 0x1000}], 0x5, &(0x7f00000074c0)=""/4096, 0x1000}, 0x0) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000008500), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000085c0)={0xd, 0xb, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x32a}, [@generic={0x7, 0x3ff, 0x1, 0x3}, @map={0x18, 0x8, 0x1, 0x0, r4}, @jmp={0x5, 0x1, 0xb, 0x4, 0x1, 0xffffffffffffffe0, 0x4}, @jmp={0x5, 0x8, 0x5, 0xe, 0xb, 0x30, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0xd}, @exit, @generic={0x0, 0xc6, 0xa20, 0x9}]}, &(0x7f0000000640)='GPL\x00', 0x34, 0x40, &(0x7f0000000900)=""/64, 0x41100, 0x1, [], r5, 0xd, r6, 0x8, &(0x7f0000008540)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000008580)={0x3, 0x8, 0x3, 0x1}, 0x10}, 0x70) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r7, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r3, 0x0, 0x17, &(0x7f00000003c0)='cgroup.subtree_control\x00', 0xffffffffffffffff}, 0x30) close(r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000580)={0x2, 0x8, 0x10000, 0x4}, &(0x7f00000005c0)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0xa987}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000840)={r8, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000004c0)='&@[\x00', r9}, 0x30) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000680)='&@[\x00') socket$kcm(0x29, 0x2, 0x0) 00:53:03 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000340)=""/124, 0x7c}, {&(0x7f00000003c0)=""/117, 0x75}, {&(0x7f0000000440)=""/103, 0x67}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000640)=""/113, 0x71}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000140)}], 0x8}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x40) r3 = socket$kcm(0x11, 0x6, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000900)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f807101086ca345cb5b2aa1f568a6f8fa813edf09a99c8182227260991baaa80caa3a6157365b850f06bb83dc3628178b045971c88361660afb0709c"], 0x0, 0x7f, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, 0xffffffffffffffff, 0x0, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000140)=r4, 0x4) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x10001) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 00:53:03 executing program 5: r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0xfffffffffffffffd, 0x0) 00:53:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfaD\x00\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:53:03 executing program 5: r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0xfffffffffffffffd, 0x0) 00:53:03 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000340)=""/124, 0x7c}, {&(0x7f00000003c0)=""/117, 0x75}, {&(0x7f0000000440)=""/103, 0x67}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000640)=""/113, 0x71}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000140)}], 0x8}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x40) r3 = socket$kcm(0x11, 0x6, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000900)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f807101086ca345cb5b2aa1f568a6f8fa813edf09a99c8182227260991baaa80caa3a6157365b850f06bb83dc3628178b045971c88361660afb0709c"], 0x0, 0x7f, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, 0xffffffffffffffff, 0x0, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000140)=r4, 0x4) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x10001) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 00:53:04 executing program 5: r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0xfffffffffffffffd, 0x0) 00:53:04 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000340)=""/124, 0x7c}, {&(0x7f00000003c0)=""/117, 0x75}, {&(0x7f0000000440)=""/103, 0x67}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000640)=""/113, 0x71}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000140)}], 0x8}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x40) r3 = socket$kcm(0x11, 0x6, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000900)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f807101086ca345cb5b2aa1f568a6f8fa813edf09a99c8182227260991baaa80caa3a6157365b850f06bb83dc3628178b045971c88361660afb0709c"], 0x0, 0x7f, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, 0xffffffffffffffff, 0x0, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000140)=r4, 0x4) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x10001) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 00:53:04 executing program 1: r0 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000002200000007000000000000009500000000000000c256f81ceef4a74d2e3914e3504ee11b525f202c33178114ec6a58e99e37ec61d16ecb6731f0ecd6afb660d265cf02ffdb2d942f36242c7fede3e2d1ea3874207b546b2e6268bd4373cf3066d525719ff1468100ac561d9a62879597f681760601de6540c6ac368eb59bc166bd592f53267e130ee772d98b686d49006afe2111fa694278b371d2a9e7133a6a7b782f16a53d0fe942a0359f0d93a6d3e42b7d0b1b2a3c459327015a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x3c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x3, 0x3e, 0x0, &(0x7f0000000040)="d95dcdfb001000fc00fcffff86dd6a00000000072feb3003cdc7dba155c1ff00010000000000004635b9e1381e1435c9e49946b0e8d52c006558aca3a984", 0x0, 0x93f0}, 0x28) [ 542.971074][T22248] device nr0 entered promiscuous mode 00:53:04 executing program 5: r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0xfffffffffffffffd, 0x0) 00:53:04 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000340)=""/124, 0x7c}, {&(0x7f00000003c0)=""/117, 0x75}, {&(0x7f0000000440)=""/103, 0x67}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000640)=""/113, 0x71}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000140)}], 0x8}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x40) r3 = socket$kcm(0x11, 0x6, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000900)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f807101086ca345cb5b2aa1f568a6f8fa813edf09a99c8182227260991baaa80caa3a6157365b850f06bb83dc3628178b045971c88361660afb0709c"], 0x0, 0x7f, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, 0xffffffffffffffff, 0x0, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000140)=r4, 0x4) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x10001) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 00:53:04 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB]}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0xcb280000, 0x0, 0x1f4}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280), 0xe803}], 0x1}, 0x0) 00:53:04 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003004000000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:53:04 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000340)=""/124, 0x7c}, {&(0x7f00000003c0)=""/117, 0x75}, {&(0x7f0000000440)=""/103, 0x67}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000640)=""/113, 0x71}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000140)}], 0x8}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x40) r3 = socket$kcm(0x11, 0x6, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000900)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f807101086ca345cb5b2aa1f568a6f8fa813edf09a99c8182227260991baaa80caa3a6157365b850f06bb83dc3628178b045971c88361660afb0709c"], 0x0, 0x7f, 0x0, 0x1}, 0x20) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, 0xffffffffffffffff, 0x0, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000140)=r4, 0x4) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x10001) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 543.566026][T22279] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 00:53:04 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r7, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) [ 543.676309][T22282] netlink: 'syz-executor.5': attribute type 3 has an invalid length. [ 543.784507][T22252] device nr0 entered promiscuous mode 00:53:05 executing program 4: socket$kcm(0x10, 0x0, 0x10) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000240)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) close(r0) 00:53:05 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000140081f87059ae08060c04002cff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) 00:53:05 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x2, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000040)=@in={0x2, 0x0, @dev}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000002bc0)={&(0x7f0000000680)=@can={0x1d, 0x0}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x1, &(0x7f00000002c0)=@raw=[@generic], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:53:05 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000700)=0x85) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 00:53:05 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003004000000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 544.300034][T22297] netlink: 'syz-executor.5': attribute type 3 has an invalid length. [ 544.347329][T22305] device nr0 entered promiscuous mode 00:53:05 executing program 4: socket$kcm(0x10, 0x0, 0x10) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000240)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) close(r0) 00:53:05 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000140081f87059ae08060c04002cff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) 00:53:05 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r7, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) 00:53:05 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003004000000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 544.638786][T22321] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 00:53:05 executing program 4: socket$kcm(0x10, 0x0, 0x10) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000240)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) close(r0) 00:53:05 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003004000000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:53:05 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r7, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) [ 544.898380][T22333] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 00:53:06 executing program 4: socket$kcm(0x10, 0x0, 0x10) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000240)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) close(r0) 00:53:06 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r7, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) 00:53:06 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000140081f87059ae08060c04002cff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) [ 545.724087][T22305] device nr0 entered promiscuous mode 00:53:07 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000700)=0x85) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 00:53:07 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r7, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) 00:53:07 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r7, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) 00:53:07 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000140081f87059ae08060c04002cff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) 00:53:07 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r7, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) 00:53:07 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r7, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) [ 546.327903][T22362] device nr0 entered promiscuous mode 00:53:07 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r7, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) 00:53:08 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r7, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) 00:53:08 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r7, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) [ 547.684904][T22388] IPVS: ftp: loaded support on port[0] = 21 [ 547.948086][T22388] chnl_net:caif_netlink_parms(): no params data found [ 547.977499][T22388] bridge0: port 1(bridge_slave_0) entered blocking state [ 547.984755][T22388] bridge0: port 1(bridge_slave_0) entered disabled state [ 547.992610][T22388] device bridge_slave_0 entered promiscuous mode [ 548.068635][T22388] bridge0: port 2(bridge_slave_1) entered blocking state [ 548.076182][T22388] bridge0: port 2(bridge_slave_1) entered disabled state [ 548.084002][T22388] device bridge_slave_1 entered promiscuous mode [ 548.103089][T22388] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 548.114786][T22388] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 548.200157][T22388] team0: Port device team_slave_0 added [ 548.207803][T22388] team0: Port device team_slave_1 added [ 548.256606][T22388] device hsr_slave_0 entered promiscuous mode [ 548.314835][T22388] device hsr_slave_1 entered promiscuous mode [ 548.364631][T22388] debugfs: Directory 'hsr0' with parent '/' already present! [ 548.449661][T22388] bridge0: port 2(bridge_slave_1) entered blocking state [ 548.456785][T22388] bridge0: port 2(bridge_slave_1) entered forwarding state [ 548.464265][T22388] bridge0: port 1(bridge_slave_0) entered blocking state [ 548.471399][T22388] bridge0: port 1(bridge_slave_0) entered forwarding state [ 548.582875][T22388] 8021q: adding VLAN 0 to HW filter on device bond0 [ 548.605575][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 548.615424][T21145] bridge0: port 1(bridge_slave_0) entered disabled state [ 548.624000][T21145] bridge0: port 2(bridge_slave_1) entered disabled state [ 548.707171][T22388] 8021q: adding VLAN 0 to HW filter on device team0 [ 548.717816][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 548.726519][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 548.734926][T21145] bridge0: port 1(bridge_slave_0) entered blocking state [ 548.741987][T21145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 548.753375][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 548.762056][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 548.770916][T21145] bridge0: port 2(bridge_slave_1) entered blocking state [ 548.778031][T21145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 548.790819][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 548.851748][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 548.863551][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 548.873234][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 548.882487][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 548.897371][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 548.906336][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 548.915277][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 548.923639][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 548.970555][T22388] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 548.981917][T22388] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 548.990383][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 548.998827][T21145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 549.060085][T22388] 8021q: adding VLAN 0 to HW filter on device batadv0 00:53:10 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x20000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//\n+yz', 0x1ff) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x21fff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) close(r1) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x04a\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD\x02\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9f|\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x1ff, 0x100000000, 0x7f, 0x0, 0x0, 0x7, 0x0, 0x5, 0x0, 0x459896a5, 0x8, 0x10001, 0x0, 0x9, 0x6, 0x3f, 0x7, 0x401, 0x40, 0x495, 0x0, 0x800, 0x0, 0x58b4, 0x3, 0x0, 0x0, 0x8, 0x100000000, 0x0, 0xf30a, 0x0, 0x0, 0x2, 0x101, 0x0, 0x0, 0xee, 0x3, @perf_config_ext={0x2, 0x4}, 0x11102, 0x0, 0x7, 0x0, 0xe87d, 0xa69}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0xf547, 0x0, 0x0, 0x9, 0x0, 0xffff, 0x0, 0x0, 0x5, 0x6, 0x0, 0x5, 0x0, 0x9, 0x47ba6378, 0x4, 0x0, 0x1c00000000000000, 0xbd95, 0x0, 0x7, 0x0, 0x1, 0x8001, 0x3e, 0x4b8, 0x3, 0x618, 0x0, 0x0, 0x4, 0x0, 0x7, 0x7, 0x6, 0x0, 0x0, 0x4b, 0x4, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x401, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x12) 00:53:10 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r7, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) 00:53:10 executing program 0: socket$kcm(0x10, 0x0, 0x10) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000240)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) close(r0) 00:53:10 executing program 1: r0 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@fwd={0x7, 0x0, 0x0, 0x20000904}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000880)=""/192, 0x2d, 0xc0, 0x1}, 0x20) 00:53:10 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000700)=0x85) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 00:53:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x100, 0x10}, 0xc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000004c0)=ANY=[]) 00:53:10 executing program 1: r0 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@fwd={0x7, 0x0, 0x0, 0x20000904}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000880)=""/192, 0x2d, 0xc0, 0x1}, 0x20) 00:53:10 executing program 0: socket$kcm(0x10, 0x0, 0x10) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000240)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) close(r0) [ 549.339811][ T608] device bridge_slave_1 left promiscuous mode [ 549.355741][ T608] bridge0: port 2(bridge_slave_1) entered disabled state [ 549.440446][ T608] device bridge_slave_0 left promiscuous mode [ 549.450498][ T608] bridge0: port 1(bridge_slave_0) entered disabled state 00:53:10 executing program 0: socket$kcm(0x10, 0x0, 0x10) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000240)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) close(r0) 00:53:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffff9c, 0x28, &(0x7f0000000280)}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x100000001}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000067c0)={0x0, 0x0, 0x101, 0x3, 0x80, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) perf_event_open(&(0x7f0000000900)={0x1, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00', r2}, 0x10) r3 = socket$kcm(0x2, 0x2, 0x73) sendmsg$kcm(r3, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r4 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x20820000, r4}, 0x2c) sendmsg$kcm(r3, &(0x7f00000001c0)={&(0x7f0000000100)=@caif, 0x80, &(0x7f0000000180)}, 0x8000) 00:53:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffff9c, 0x28, &(0x7f0000000280)}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x100000001}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000067c0)={0x0, 0x0, 0x101, 0x3, 0x80, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) perf_event_open(&(0x7f0000000900)={0x1, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00', r2}, 0x10) r3 = socket$kcm(0x2, 0x2, 0x73) sendmsg$kcm(r3, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r4 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x20820000, r4}, 0x2c) sendmsg$kcm(r3, &(0x7f00000001c0)={&(0x7f0000000100)=@caif, 0x80, &(0x7f0000000180)}, 0x8000) 00:53:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffff9c, 0x28, &(0x7f0000000280)}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x100000001}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000067c0)={0x0, 0x0, 0x101, 0x3, 0x80, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) perf_event_open(&(0x7f0000000900)={0x1, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00', r2}, 0x10) r3 = socket$kcm(0x2, 0x2, 0x73) sendmsg$kcm(r3, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r4 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x20820000, r4}, 0x2c) sendmsg$kcm(r3, &(0x7f00000001c0)={&(0x7f0000000100)=@caif, 0x80, &(0x7f0000000180)}, 0x8000) [ 552.075272][ T608] device hsr_slave_0 left promiscuous mode [ 552.114459][ T608] device hsr_slave_1 left promiscuous mode [ 552.172239][ T608] team0 (unregistering): Port device team_slave_1 removed [ 552.187770][ T608] team0 (unregistering): Port device team_slave_0 removed [ 552.200994][ T608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 552.263686][ T608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 552.376641][ T608] bond0 (unregistering): Released all slaves [ 552.522045][T22415] device nr0 entered promiscuous mode 00:53:14 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x20000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//\n+yz', 0x1ff) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x21fff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) close(r1) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x04a\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD\x02\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9f|\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x1ff, 0x100000000, 0x7f, 0x0, 0x0, 0x7, 0x0, 0x5, 0x0, 0x459896a5, 0x8, 0x10001, 0x0, 0x9, 0x6, 0x3f, 0x7, 0x401, 0x40, 0x495, 0x0, 0x800, 0x0, 0x58b4, 0x3, 0x0, 0x0, 0x8, 0x100000000, 0x0, 0xf30a, 0x0, 0x0, 0x2, 0x101, 0x0, 0x0, 0xee, 0x3, @perf_config_ext={0x2, 0x4}, 0x11102, 0x0, 0x7, 0x0, 0xe87d, 0xa69}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0xf547, 0x0, 0x0, 0x9, 0x0, 0xffff, 0x0, 0x0, 0x5, 0x6, 0x0, 0x5, 0x0, 0x9, 0x47ba6378, 0x4, 0x0, 0x1c00000000000000, 0xbd95, 0x0, 0x7, 0x0, 0x1, 0x8001, 0x3e, 0x4b8, 0x3, 0x618, 0x0, 0x0, 0x4, 0x0, 0x7, 0x7, 0x6, 0x0, 0x0, 0x4b, 0x4, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x401, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x12) 00:53:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffff9c, 0x28, &(0x7f0000000280)}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x100000001}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000067c0)={0x0, 0x0, 0x101, 0x3, 0x80, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) perf_event_open(&(0x7f0000000900)={0x1, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00', r2}, 0x10) r3 = socket$kcm(0x2, 0x2, 0x73) sendmsg$kcm(r3, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r4 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x20820000, r4}, 0x2c) sendmsg$kcm(r3, &(0x7f00000001c0)={&(0x7f0000000100)=@caif, 0x80, &(0x7f0000000180)}, 0x8000) 00:53:14 executing program 1: r0 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@fwd={0x7, 0x0, 0x0, 0x20000904}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000880)=""/192, 0x2d, 0xc0, 0x1}, 0x20) 00:53:14 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210}, 0xffffffffffffffe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unlink(&(0x7f0000000780)='./file0/../file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x64043, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r4}) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) sendmsg$kcm(r6, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0xffffffffffffffdf, 0x1, 0xdfe0, 0x0, 0xfffffffffffffffe, 0x400, 0x1, 0x40c7, 0xb1a4, 0x3, 0x0, 0x0, 0x7, 0xabd, 0x1, 0x0, 0x1, 0xfff, 0x9, 0x5, 0xc300000, 0x80000000, 0xbd, 0x74, 0x979e, 0x2, 0x8, 0x7, 0x20d400000, 0x10000, 0x0, 0x241b40e5, 0x0, 0x0, 0x2, 0x0, 0xfb, 0x1, @perf_config_ext={0xc2, 0xf9}, 0x1152, 0x453, 0x2, 0x2, 0x6, 0xffff}, 0xffffffffffffffff, 0x4, r5, 0xa) openat$cgroup_ro(r7, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) close(r1) 00:53:14 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000700)=0x85) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 00:53:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x100, 0x10}, 0xc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000004c0)=ANY=[]) 00:53:14 executing program 1: r0 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@fwd={0x7, 0x0, 0x0, 0x20000904}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000880)=""/192, 0x2d, 0xc0, 0x1}, 0x20) [ 553.117217][T22475] device nr0 entered promiscuous mode 00:53:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffff9c, 0x28, &(0x7f0000000280)}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x100000001}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000067c0)={0x0, 0x0, 0x101, 0x3, 0x80, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) perf_event_open(&(0x7f0000000900)={0x1, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00', r2}, 0x10) r3 = socket$kcm(0x2, 0x2, 0x73) sendmsg$kcm(r3, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r4 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x20820000, r4}, 0x2c) sendmsg$kcm(r3, &(0x7f00000001c0)={&(0x7f0000000100)=@caif, 0x80, &(0x7f0000000180)}, 0x8000) [ 553.184976][T22477] device nr0 entered promiscuous mode 00:53:14 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x4, 0x4, 0x100000003, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) 00:53:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffff9c, 0x28, &(0x7f0000000280)}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x100000001}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000067c0)={0x0, 0x0, 0x101, 0x3, 0x80, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) perf_event_open(&(0x7f0000000900)={0x1, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00', r2}, 0x10) r3 = socket$kcm(0x2, 0x2, 0x73) sendmsg$kcm(r3, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r4 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x20820000, r4}, 0x2c) sendmsg$kcm(r3, &(0x7f00000001c0)={&(0x7f0000000100)=@caif, 0x80, &(0x7f0000000180)}, 0x8000) 00:53:14 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x4, 0x4, 0x100000003, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) 00:53:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffff9c, 0x28, &(0x7f0000000280)}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x100000001}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000067c0)={0x0, 0x0, 0x101, 0x3, 0x80, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) perf_event_open(&(0x7f0000000900)={0x1, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00', r2}, 0x10) r3 = socket$kcm(0x2, 0x2, 0x73) sendmsg$kcm(r3, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r4 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x20820000, r4}, 0x2c) sendmsg$kcm(r3, &(0x7f00000001c0)={&(0x7f0000000100)=@caif, 0x80, &(0x7f0000000180)}, 0x8000) [ 553.833074][T22472] device nr0 entered promiscuous mode 00:53:15 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x20000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//\n+yz', 0x1ff) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x21fff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) close(r1) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x04a\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD\x02\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9f|\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x1ff, 0x100000000, 0x7f, 0x0, 0x0, 0x7, 0x0, 0x5, 0x0, 0x459896a5, 0x8, 0x10001, 0x0, 0x9, 0x6, 0x3f, 0x7, 0x401, 0x40, 0x495, 0x0, 0x800, 0x0, 0x58b4, 0x3, 0x0, 0x0, 0x8, 0x100000000, 0x0, 0xf30a, 0x0, 0x0, 0x2, 0x101, 0x0, 0x0, 0xee, 0x3, @perf_config_ext={0x2, 0x4}, 0x11102, 0x0, 0x7, 0x0, 0xe87d, 0xa69}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0xf547, 0x0, 0x0, 0x9, 0x0, 0xffff, 0x0, 0x0, 0x5, 0x6, 0x0, 0x5, 0x0, 0x9, 0x47ba6378, 0x4, 0x0, 0x1c00000000000000, 0xbd95, 0x0, 0x7, 0x0, 0x1, 0x8001, 0x3e, 0x4b8, 0x3, 0x618, 0x0, 0x0, 0x4, 0x0, 0x7, 0x7, 0x6, 0x0, 0x0, 0x4b, 0x4, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x401, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x12) 00:53:15 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3eb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000c940)={&(0x7f000000b6c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000b900)=[{&(0x7f000000b740)=""/202, 0xca}, {&(0x7f000000b840)=""/14, 0xe}, {&(0x7f000000b880)=""/92, 0x5c}], 0x3, &(0x7f000000b940)=""/4096, 0x1000}, 0x10040) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000c980), 0x4) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000280)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000480)=r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) openat$cgroup_procs(r4, &(0x7f0000000400)='tasks\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000ca40)={0x0, 0x11, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000700000000000000070000009500000000000000ff01080001800000018f67f1030000009500000000ed000041244c7bd865d0befac3efdc81cd9519f5770d7a2ece2917f69048da953f967f59d25a1117f8bd303a756279f2e9974fd90a8062cede32f609bd64866da77927456c7d64229d6b92a8c530f090977711a68b58fb34b0be31d6ea8f86"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, [], r2, 0xa, r3, 0x8, &(0x7f000000c9c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f000000ca00)={0x0, 0x10, 0xfff, 0x80}, 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmsg(r6, &(0x7f0000003a80)={&(0x7f00000039c0)=@xdp, 0x80, &(0x7f0000003a40)}, 0x10000) 00:53:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x37) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480), 0x4) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={&(0x7f0000000080)=""/118, 0x76}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1ff) recvmsg$kcm(r1, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x80000001, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001780)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) close(r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={0x0, 0x0}, 0x20) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x20008810) 00:53:15 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x4, 0x4, 0x100000003, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) 00:53:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 00:53:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x100, 0x10}, 0xc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000004c0)=ANY=[]) 00:53:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 00:53:15 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x4, 0x4, 0x100000003, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) 00:53:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x37) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480), 0x4) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={&(0x7f0000000080)=""/118, 0x76}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1ff) recvmsg$kcm(r1, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x80000001, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001780)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) close(r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={0x0, 0x0}, 0x20) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x20008810) [ 554.875593][T22527] device nr0 entered promiscuous mode [ 555.022335][T22529] device nr0 entered promiscuous mode 00:53:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 00:53:16 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x3, &(0x7f0000002340)=r0, 0x4) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="39000000140081ae0000dc676f97daf02ccc690e3fb23858af8423300b2c000500058701546fabca1b4e7d06a6580e88370200c54c1960b89c", 0x39}], 0x1}, 0x0) 00:53:16 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3eb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000c940)={&(0x7f000000b6c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000b900)=[{&(0x7f000000b740)=""/202, 0xca}, {&(0x7f000000b840)=""/14, 0xe}, {&(0x7f000000b880)=""/92, 0x5c}], 0x3, &(0x7f000000b940)=""/4096, 0x1000}, 0x10040) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000c980), 0x4) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000280)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000480)=r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) openat$cgroup_procs(r4, &(0x7f0000000400)='tasks\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000ca40)={0x0, 0x11, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000700000000000000070000009500000000000000ff01080001800000018f67f1030000009500000000ed000041244c7bd865d0befac3efdc81cd9519f5770d7a2ece2917f69048da953f967f59d25a1117f8bd303a756279f2e9974fd90a8062cede32f609bd64866da77927456c7d64229d6b92a8c530f090977711a68b58fb34b0be31d6ea8f86"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, [], r2, 0xa, r3, 0x8, &(0x7f000000c9c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f000000ca00)={0x0, 0x10, 0xfff, 0x80}, 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmsg(r6, &(0x7f0000003a80)={&(0x7f00000039c0)=@xdp, 0x80, &(0x7f0000003a40)}, 0x10000) 00:53:16 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x20000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//\n+yz', 0x1ff) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x21fff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) close(r1) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x04a\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD\x02\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9f|\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x1ff, 0x100000000, 0x7f, 0x0, 0x0, 0x7, 0x0, 0x5, 0x0, 0x459896a5, 0x8, 0x10001, 0x0, 0x9, 0x6, 0x3f, 0x7, 0x401, 0x40, 0x495, 0x0, 0x800, 0x0, 0x58b4, 0x3, 0x0, 0x0, 0x8, 0x100000000, 0x0, 0xf30a, 0x0, 0x0, 0x2, 0x101, 0x0, 0x0, 0xee, 0x3, @perf_config_ext={0x2, 0x4}, 0x11102, 0x0, 0x7, 0x0, 0xe87d, 0xa69}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0xf547, 0x0, 0x0, 0x9, 0x0, 0xffff, 0x0, 0x0, 0x5, 0x6, 0x0, 0x5, 0x0, 0x9, 0x47ba6378, 0x4, 0x0, 0x1c00000000000000, 0xbd95, 0x0, 0x7, 0x0, 0x1, 0x8001, 0x3e, 0x4b8, 0x3, 0x618, 0x0, 0x0, 0x4, 0x0, 0x7, 0x7, 0x6, 0x0, 0x0, 0x4b, 0x4, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x401, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x12) 00:53:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x37) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480), 0x4) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={&(0x7f0000000080)=""/118, 0x76}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1ff) recvmsg$kcm(r1, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x80000001, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001780)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) close(r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={0x0, 0x0}, 0x20) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x20008810) 00:53:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 00:53:16 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x3, &(0x7f0000002340)=r0, 0x4) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="39000000140081ae0000dc676f97daf02ccc690e3fb23858af8423300b2c000500058701546fabca1b4e7d06a6580e88370200c54c1960b89c", 0x39}], 0x1}, 0x0) 00:53:16 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3eb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000c940)={&(0x7f000000b6c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000b900)=[{&(0x7f000000b740)=""/202, 0xca}, {&(0x7f000000b840)=""/14, 0xe}, {&(0x7f000000b880)=""/92, 0x5c}], 0x3, &(0x7f000000b940)=""/4096, 0x1000}, 0x10040) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000c980), 0x4) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000280)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000480)=r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) openat$cgroup_procs(r4, &(0x7f0000000400)='tasks\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000ca40)={0x0, 0x11, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000700000000000000070000009500000000000000ff01080001800000018f67f1030000009500000000ed000041244c7bd865d0befac3efdc81cd9519f5770d7a2ece2917f69048da953f967f59d25a1117f8bd303a756279f2e9974fd90a8062cede32f609bd64866da77927456c7d64229d6b92a8c530f090977711a68b58fb34b0be31d6ea8f86"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, [], r2, 0xa, r3, 0x8, &(0x7f000000c9c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f000000ca00)={0x0, 0x10, 0xfff, 0x80}, 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmsg(r6, &(0x7f0000003a80)={&(0x7f00000039c0)=@xdp, 0x80, &(0x7f0000003a40)}, 0x10000) 00:53:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x100, 0x10}, 0xc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000004c0)=ANY=[]) 00:53:16 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x3, &(0x7f0000002340)=r0, 0x4) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="39000000140081ae0000dc676f97daf02ccc690e3fb23858af8423300b2c000500058701546fabca1b4e7d06a6580e88370200c54c1960b89c", 0x39}], 0x1}, 0x0) 00:53:17 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x37) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480), 0x4) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={&(0x7f0000000080)=""/118, 0x76}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1ff) recvmsg$kcm(r1, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x80000001, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001780)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) close(r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={0x0, 0x0}, 0x20) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x20008810) 00:53:17 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x3, &(0x7f0000002340)=r0, 0x4) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="39000000140081ae0000dc676f97daf02ccc690e3fb23858af8423300b2c000500058701546fabca1b4e7d06a6580e88370200c54c1960b89c", 0x39}], 0x1}, 0x0) [ 555.931377][T22575] device nr0 entered promiscuous mode 00:53:17 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3eb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000c940)={&(0x7f000000b6c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000b900)=[{&(0x7f000000b740)=""/202, 0xca}, {&(0x7f000000b840)=""/14, 0xe}, {&(0x7f000000b880)=""/92, 0x5c}], 0x3, &(0x7f000000b940)=""/4096, 0x1000}, 0x10040) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000c980), 0x4) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000280)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000480)=r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) openat$cgroup_procs(r4, &(0x7f0000000400)='tasks\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000ca40)={0x0, 0x11, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000700000000000000070000009500000000000000ff01080001800000018f67f1030000009500000000ed000041244c7bd865d0befac3efdc81cd9519f5770d7a2ece2917f69048da953f967f59d25a1117f8bd303a756279f2e9974fd90a8062cede32f609bd64866da77927456c7d64229d6b92a8c530f090977711a68b58fb34b0be31d6ea8f86"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, [], r2, 0xa, r3, 0x8, &(0x7f000000c9c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f000000ca00)={0x0, 0x10, 0xfff, 0x80}, 0x10}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmsg(r6, &(0x7f0000003a80)={&(0x7f00000039c0)=@xdp, 0x80, &(0x7f0000003a40)}, 0x10000) 00:53:17 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x3, &(0x7f0000002340)=r0, 0x4) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="39000000140081ae0000dc676f97daf02ccc690e3fb23858af8423300b2c000500058701546fabca1b4e7d06a6580e88370200c54c1960b89c", 0x39}], 0x1}, 0x0) 00:53:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="2e00000039000508005a80647e63940d0224fc0010000200000535820900068004001700d1bd00000000b5a8e438", 0x2e}], 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) [ 556.259867][T22596] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 556.287438][T22596] __nla_validate_parse: 5 callbacks suppressed [ 556.287449][T22596] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. [ 556.446355][T22596] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 556.464552][T22596] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. 00:53:17 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x3, &(0x7f0000002340)=r0, 0x4) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="39000000140081ae0000dc676f97daf02ccc690e3fb23858af8423300b2c000500058701546fabca1b4e7d06a6580e88370200c54c1960b89c", 0x39}], 0x1}, 0x0) 00:53:17 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x3, &(0x7f0000002340)=r0, 0x4) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="39000000140081ae0000dc676f97daf02ccc690e3fb23858af8423300b2c000500058701546fabca1b4e7d06a6580e88370200c54c1960b89c", 0x39}], 0x1}, 0x0) 00:53:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="2e00000039000508005a80647e63940d0224fc0010000200000535820900068004001700d1bd00000000b5a8e438", 0x2e}], 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) [ 556.733051][T22606] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 556.746898][T22606] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. 00:53:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="2e00000039000508005a80647e63940d0224fc0010000200000535820900068004001700d1bd00000000b5a8e438", 0x2e}], 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) [ 556.902045][T22614] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 556.910821][T22614] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. 00:53:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="2e00000039000508005a80647e63940d0224fc0010000200000535820900068004001700d1bd00000000b5a8e438", 0x2e}], 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) [ 557.021901][T22618] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 557.030528][T22618] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. 00:53:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x1, 0x8, &(0x7f00000000c0), 0x4) 00:53:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)='(`]proc\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000005c0)={0x6, 0x70, 0x7fff, 0x6, 0x3, 0x9, 0x0, 0x0, 0x800, 0x2, 0x1, 0x0, 0x5, 0x9, 0x3, 0x5, 0xfffffffffffff493, 0xfffffffffffffffc, 0x7fffffff, 0x5, 0xff, 0x1, 0x1, 0x5, 0x7, 0x35f, 0x0, 0x0, 0x1, 0x1000, 0xfffffffffffffffe, 0x100000001, 0x5, 0x5b59, 0x401, 0x7, 0x7fff, 0x1, 0x0, 0x101, 0x0, @perf_config_ext={0x7fff, 0x5e92}, 0x1000, 0xfffffffffffffff7, 0xee3, 0x7, 0x2610fa13, 0x9, 0x80}, 0x0, 0xb, r0, 0x3) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 00:53:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x74}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:53:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000540)='memory.events\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='io.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000004c0)={r1}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00010005000000000000190e000600000000010000000153b4", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(r1, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) 00:53:19 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)}, 0x10) r0 = socket$kcm(0x29, 0x84, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ef8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x5f, 0xffffffffffffffff}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x20c) r3 = socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8981, &(0x7f0000000400)=0x500) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000540)=[{0x0}], 0x1, 0x0, 0x0, 0x40010}, 0x80000000001) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) socketpair(0x0, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 00:53:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001e40)={0x0, 0x0, 0x0}, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cead501000000de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 00:53:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x74}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 558.314379][ C0] net_ratelimit: 12 callbacks suppressed [ 558.314387][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 558.325986][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:53:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x1, 0x8, &(0x7f00000000c0), 0x4) 00:53:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000540)='memory.events\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='io.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000004c0)={r1}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00010005000000000000190e000600000000010000000153b4", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(r1, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) [ 558.426707][T22626] device nr0 entered promiscuous mode [ 558.474380][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 558.480208][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:53:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x74}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:53:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x1, 0x8, &(0x7f00000000c0), 0x4) 00:53:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000540)='memory.events\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='io.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000004c0)={r1}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00010005000000000000190e000600000000010000000153b4", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(r1, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) 00:53:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x74}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 559.238664][T22626] device nr0 entered promiscuous mode 00:53:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)='(`]proc\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000005c0)={0x6, 0x70, 0x7fff, 0x6, 0x3, 0x9, 0x0, 0x0, 0x800, 0x2, 0x1, 0x0, 0x5, 0x9, 0x3, 0x5, 0xfffffffffffff493, 0xfffffffffffffffc, 0x7fffffff, 0x5, 0xff, 0x1, 0x1, 0x5, 0x7, 0x35f, 0x0, 0x0, 0x1, 0x1000, 0xfffffffffffffffe, 0x100000001, 0x5, 0x5b59, 0x401, 0x7, 0x7fff, 0x1, 0x0, 0x101, 0x0, @perf_config_ext={0x7fff, 0x5e92}, 0x1000, 0xfffffffffffffff7, 0xee3, 0x7, 0x2610fa13, 0x9, 0x80}, 0x0, 0xb, r0, 0x3) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 00:53:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x1, 0x8, &(0x7f00000000c0), 0x4) 00:53:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000540)='memory.events\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='io.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000004c0)={r1}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00010005000000000000190e000600000000010000000153b4", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(r1, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) 00:53:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001e40)={0x0, 0x0, 0x0}, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cead501000000de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 00:53:20 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003700000bfa30000000000000702000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006502faff000000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x2b, 0x5, 0x0) 00:53:20 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)}, 0x10) r0 = socket$kcm(0x29, 0x84, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ef8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x5f, 0xffffffffffffffff}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x20c) r3 = socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8981, &(0x7f0000000400)=0x500) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000540)=[{0x0}], 0x1, 0x0, 0x0, 0x40010}, 0x80000000001) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) socketpair(0x0, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 00:53:20 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)}, 0x10) r0 = socket$kcm(0x29, 0x84, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ef8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x5f, 0xffffffffffffffff}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x20c) r3 = socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8981, &(0x7f0000000400)=0x500) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000540)=[{0x0}], 0x1, 0x0, 0x0, 0x40010}, 0x80000000001) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) socketpair(0x0, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 00:53:20 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)}, 0x10) r0 = socket$kcm(0x29, 0x84, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ef8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x5f, 0xffffffffffffffff}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x20c) r3 = socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8981, &(0x7f0000000400)=0x500) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000540)=[{0x0}], 0x1, 0x0, 0x0, 0x40010}, 0x80000000001) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) socketpair(0x0, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 00:53:20 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003700000bfa30000000000000702000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006502faff000000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x2b, 0x5, 0x0) [ 559.647444][T22681] device nr0 entered promiscuous mode 00:53:21 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)}, 0x10) r0 = socket$kcm(0x29, 0x84, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ef8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x5f, 0xffffffffffffffff}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x20c) r3 = socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8981, &(0x7f0000000400)=0x500) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000540)=[{0x0}], 0x1, 0x0, 0x0, 0x40010}, 0x80000000001) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) socketpair(0x0, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 00:53:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001e40)={0x0, 0x0, 0x0}, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cead501000000de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 00:53:21 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003700000bfa30000000000000702000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006502faff000000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x2b, 0x5, 0x0) 00:53:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)='(`]proc\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000005c0)={0x6, 0x70, 0x7fff, 0x6, 0x3, 0x9, 0x0, 0x0, 0x800, 0x2, 0x1, 0x0, 0x5, 0x9, 0x3, 0x5, 0xfffffffffffff493, 0xfffffffffffffffc, 0x7fffffff, 0x5, 0xff, 0x1, 0x1, 0x5, 0x7, 0x35f, 0x0, 0x0, 0x1, 0x1000, 0xfffffffffffffffe, 0x100000001, 0x5, 0x5b59, 0x401, 0x7, 0x7fff, 0x1, 0x0, 0x101, 0x0, @perf_config_ext={0x7fff, 0x5e92}, 0x1000, 0xfffffffffffffff7, 0xee3, 0x7, 0x2610fa13, 0x9, 0x80}, 0x0, 0xb, r0, 0x3) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 00:53:21 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003700000bfa30000000000000702000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006502faff000000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x2b, 0x5, 0x0) 00:53:21 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)}, 0x10) r0 = socket$kcm(0x29, 0x84, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ef8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x5f, 0xffffffffffffffff}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x20c) r3 = socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8981, &(0x7f0000000400)=0x500) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000540)=[{0x0}], 0x1, 0x0, 0x0, 0x40010}, 0x80000000001) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) socketpair(0x0, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 00:53:21 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)}, 0x10) r0 = socket$kcm(0x29, 0x84, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ef8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x5f, 0xffffffffffffffff}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x20c) r3 = socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8981, &(0x7f0000000400)=0x500) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000540)=[{0x0}], 0x1, 0x0, 0x0, 0x40010}, 0x80000000001) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) socketpair(0x0, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 00:53:21 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)}, 0x10) r0 = socket$kcm(0x29, 0x84, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ef8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x5f, 0xffffffffffffffff}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x20c) r3 = socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8981, &(0x7f0000000400)=0x500) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000540)=[{0x0}], 0x1, 0x0, 0x0, 0x40010}, 0x80000000001) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) socketpair(0x0, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 00:53:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001e40)={0x0, 0x0, 0x0}, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cead501000000de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 00:53:21 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0xd, 0x1, &(0x7f0000000800)=@raw=[@ldst={0x3, 0x3, 0x0, 0x1, 0x8, 0x18, 0x1}], &(0x7f0000000840)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x4, 0xe, 0x9, 0x80}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0xffffffffffffffff, r0, 0x0, 0xa, &(0x7f0000000a80)='syzkaller\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0xa, &(0x7f0000000040)='syzkaller\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x2, 0x10001, 0xffffffff, 0x4, 0x0, 0x8000, 0x20000, 0x4, 0x9d, 0x5, 0x2d53, 0x80000000, 0x2, 0xffffffffffffff01, 0x3, 0x0, 0x0, 0x0, 0x5, 0xb1, 0x9, 0x3f, 0xfffffffffffffffa, 0xad, 0x100000000, 0x7dee6fd9, 0x6, 0x5, 0x4, 0x9, 0x460, 0x1b0, 0x2, 0x2, 0x87a5, 0xb025, 0x0, 0x6, 0x1, @perf_config_ext={0x200, 0x9}, 0x0, 0x9, 0x7fff, 0x9, 0x0, 0x1, 0x8}, r4, 0x10, r0, 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088ca010000000000000063a377fbac141414e9", 0x0, 0x100}, 0x28) [ 560.842546][T22732] device nr0 entered promiscuous mode 00:53:22 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)}, 0x10) r0 = socket$kcm(0x29, 0x84, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ef8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x5f, 0xffffffffffffffff}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x20c) r3 = socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8981, &(0x7f0000000400)=0x500) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000540)=[{0x0}], 0x1, 0x0, 0x0, 0x40010}, 0x80000000001) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) socketpair(0x0, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 00:53:22 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)}, 0x10) r0 = socket$kcm(0x29, 0x84, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ef8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x5f, 0xffffffffffffffff}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x20c) r3 = socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8981, &(0x7f0000000400)=0x500) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000540)=[{0x0}], 0x1, 0x0, 0x0, 0x40010}, 0x80000000001) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) socketpair(0x0, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 00:53:22 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb6cb9040a485e430d00000081fffffff08ef9000600b0ebb06ac40006001400b59f", 0x2e}], 0x1}, 0x0) 00:53:22 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff000}, {0x16}]}) 00:53:22 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0xd, 0x1, &(0x7f0000000800)=@raw=[@ldst={0x3, 0x3, 0x0, 0x1, 0x8, 0x18, 0x1}], &(0x7f0000000840)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x4, 0xe, 0x9, 0x80}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0xffffffffffffffff, r0, 0x0, 0xa, &(0x7f0000000a80)='syzkaller\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0xa, &(0x7f0000000040)='syzkaller\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x2, 0x10001, 0xffffffff, 0x4, 0x0, 0x8000, 0x20000, 0x4, 0x9d, 0x5, 0x2d53, 0x80000000, 0x2, 0xffffffffffffff01, 0x3, 0x0, 0x0, 0x0, 0x5, 0xb1, 0x9, 0x3f, 0xfffffffffffffffa, 0xad, 0x100000000, 0x7dee6fd9, 0x6, 0x5, 0x4, 0x9, 0x460, 0x1b0, 0x2, 0x2, 0x87a5, 0xb025, 0x0, 0x6, 0x1, @perf_config_ext={0x200, 0x9}, 0x0, 0x9, 0x7fff, 0x9, 0x0, 0x1, 0x8}, r4, 0x10, r0, 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088ca010000000000000063a377fbac141414e9", 0x0, 0x100}, 0x28) [ 561.781295][ T8781] WARNING: CPU: 0 PID: 8781 at kernel/bpf/core.c:851 bpf_jit_free+0x157/0x1b0 [ 561.790467][ T8781] Kernel panic - not syncing: panic_on_warn set ... [ 561.797069][ T8781] CPU: 0 PID: 8781 Comm: kworker/0:4 Not tainted 5.3.0-rc3+ #0 [ 561.804615][ T8781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.814867][ T8781] Workqueue: events bpf_prog_free_deferred [ 561.820678][ T8781] Call Trace: [ 561.823983][ T8781] dump_stack+0x172/0x1f0 [ 561.828337][ T8781] ? bpf_jit_free+0x140/0x1b0 [ 561.833030][ T8781] panic+0x2dc/0x755 [ 561.836932][ T8781] ? add_taint.cold+0x16/0x16 [ 561.841621][ T8781] ? __kasan_check_write+0x14/0x20 [ 561.846745][ T8781] ? __warn.cold+0x5/0x4c [ 561.851100][ T8781] ? __warn+0xe7/0x1e0 [ 561.855175][ T8781] ? bpf_jit_free+0x157/0x1b0 [ 561.859856][ T8781] __warn.cold+0x20/0x4c [ 561.864221][ T8781] ? kfree+0x226/0x2c0 [ 561.868298][ T8781] ? bpf_jit_free+0x157/0x1b0 [ 561.872995][ T8781] report_bug+0x263/0x2b0 [ 561.877345][ T8781] do_error_trap+0x11b/0x200 [ 561.881954][ T8781] do_invalid_op+0x37/0x50 [ 561.886374][ T8781] ? bpf_jit_free+0x157/0x1b0 [ 561.891057][ T8781] invalid_op+0x23/0x30 [ 561.895210][ T8781] RIP: 0010:bpf_jit_free+0x157/0x1b0 [ 561.900487][ T8781] Code: 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 5d 48 b8 22 01 00 00 00 00 ad de 48 39 43 70 0f 84 05 ff ff ff e8 69 66 f4 ff <0f> 0b e9 f9 fe ff ff e8 fd 9f 2e 00 e9 d9 fe ff ff 48 89 7d e0 e8 [ 561.920093][ T8781] RSP: 0018:ffff8880941e7cb0 EFLAGS: 00010293 [ 561.926162][ T8781] RAX: ffff888092376540 RBX: ffff888065340080 RCX: ffffffff817ce28d [ 561.934133][ T8781] RDX: 0000000000000000 RSI: ffffffff817e2317 RDI: ffff8880653400f0 [ 561.942097][ T8781] RBP: ffff8880941e7cd0 R08: 1ffffffff1517f00 R09: fffffbfff1517f01 [ 561.950065][ T8781] R10: fffffbfff1517f00 R11: ffffffff8a8bf807 R12: ffffc9000193d000 [ 561.958030][ T8781] R13: ffff8880653400e8 R14: ffff8880a1fbd900 R15: ffff8880ae834f00 [ 561.966017][ T8781] ? bpf_jit_uncharge_modmem+0x1d/0x30 [ 561.971487][ T8781] ? bpf_jit_free+0x157/0x1b0 [ 561.976177][ T8781] bpf_prog_free_deferred+0x27a/0x350 [ 561.981551][ T8781] process_one_work+0x9af/0x1740 [ 561.986497][ T8781] ? pwq_dec_nr_in_flight+0x320/0x320 [ 561.991862][ T8781] ? lock_acquire+0x190/0x410 [ 561.996696][ T8781] worker_thread+0x98/0xe40 [ 562.001230][ T8781] kthread+0x361/0x430 [ 562.005306][ T8781] ? process_one_work+0x1740/0x1740 [ 562.010509][ T8781] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 562.016955][ T8781] ret_from_fork+0x24/0x30 [ 562.023209][ T8781] Kernel Offset: disabled [ 562.027845][ T8781] Rebooting in 86400 seconds..